0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x72}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x778400000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffc}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x50a4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x892}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x210}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) fgetxattr(r1, &(0x7f0000000440)=@known='trusted.overlay.upper\x00', &(0x7f0000000480)=""/124, 0x7c) fchdir(0xffffffffffffffff) 20:33:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000080}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, r1, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x89}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r3 = syz_open_procfs$namespace(r2, &(0x7f00000000c0)='ns/uts\x00\xccD\xa6~\f\x9c0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xf, 0x5, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab73, 0x0, 0x0, 0x0, 0xffffffffffffff3d}, [@call={0x85, 0x0, 0x0, 0x13}, @call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000180)='syzkaller\x00', 0xb8d, 0x9, &(0x7f00000001c0)=""/9, 0x41100, 0x1, [], r1, 0x6}, 0x48) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000000)={@dev}, &(0x7f0000000080)=0x14) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:28 executing program 5: chdir(&(0x7f0000000000)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xf) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getpeername$unix(r1, &(0x7f0000000140)=@abs, &(0x7f0000000080)=0x6e) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000140)={0xe, 0x8, 0x3ff, 0x100000000, 0xf2, "3d0cf366ddd53cb22d4650c7d9e454c1ec50197cff246e751ae21a59da6741095ab77039b8d48b64343be0c8084439c7a6abdb960c65b19009a808de023749d0a3e50e7513f2c8eca94ea2fed29729dbd9adc17931dec013ab2a5a1dd2a151b3f320e413b9864786421775ab0eaeabc596efcbabe1e4971983cdcf14550909364396289235e9291ce932223abbbedec0651c53c8bfc38703786ea2734c3a72dfc6b76662ce8330ec76a03b17248d80d02704a2c2696614fedacc22ee63d175e3a6c841cda50df177b82e517130a4ca13726d12679a7ab09184e4150568314ff0cd30859e3170099d38d57f599d9f746521cf"}, 0xfe) pwrite64(r0, &(0x7f0000000000)="c20114f564e0e15aed2353a8b7f878e781578e72cabaac384f244806d0e6b17f73b68b64eaaa4b02b837be0a4fb0dc1d96263a5cac851b6ee9b20e5d1dcb33fb6629671e4243d51f102bcc3f42ea146afe7d2b9df4e3bd0bda6b83a2e8fad225d8ffe3e60ab982453b160789cb1399e2c43b042b5811f332e23e253e12e7fc30f1d4aa08ba2ddb8d519906d0aa771ea7f484cf5c6d1f468ecf84343acfdb166d1a7f6251bff862443264bebc25df7593ed7fbc8d6c6a75e6e14fb68e3e4d443b119b68105dc301aa0e4ccdfb452d2f50c021e6de887f08010fb884", 0xdb, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x180, r3, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa176}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0xf0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa44}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xab}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7c2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl(r2, 0xb702, 0x0) 20:33:28 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)={{0x107, 0x3ff, 0x81, 0x2a2, 0x1ff, 0x813f, 0xe1, 0x4}, "de53ff89baead79d34be05a82f2396060a11e2aa30d1d0fe8636a0b2c3a700621595996f59368d50d6ca4c4ce6fd7ea9e1338a7beee685f1ef42038837f1d139588ce0bb8cd7473315a8ac4a7112ac24f44ce84bf03ec58a454652000000000000bfffaac422235199fe3af0a08055aec37e5830b7bd2ef884c148e94a1d810e9ce90756a68d68cc9599f16b9a03bc0fbcd51938654af15ed9001c62acda", [[]]}, 0x1be) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000040)={0x20, 0x38, 0x10, 0x17, 0x8, 0x1, 0x2, 0x26}) 20:33:28 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000100)='ns/uts\x00') ioctl(r1, 0xb702, 0x0) 20:33:28 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) 20:33:28 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x3fc, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) 20:33:28 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="2621fcffc66fd9575a4ab6a79325164c"}, 0x1c) 20:33:29 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000200)='ns/uts\x00') r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000040)={'filter\x00', 0xc, "61e9ffb938e08a788302c9de"}, &(0x7f0000000080)=0x30) ioctl(r1, 0xb702, 0x0) [ 2205.757851] kauditd_printk_skb: 115 callbacks suppressed [ 2205.757861] audit: type=1400 audit(1549744411.660:9370): avc: denied { map } for pid=10831 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:33:33 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:33:33 executing program 5: chdir(&(0x7f00000001c0)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xf) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0x1, 0x4, [@multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}]}, 0x20) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) inotify_init1(0x80800) 20:33:33 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e21, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x400, &(0x7f0000000000)='netdevsim0\x00', 0xde8c, 0xffffffff8ea709ee, 0x4}) 20:33:33 executing program 2: clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() inotify_init1(0x800) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='\x00'}, 0x10) read(r1, &(0x7f0000000340)=""/128, 0x80) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x80000, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) r3 = getpid() ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000180)={[], 0x9, 0xfffffffffffffff7, 0xfffffffffffffe00, 0x1000, 0x101, r0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@dev, @mcast1, @empty, 0x3, 0x0, 0x0, 0x800000000118}) readv(r1, &(0x7f0000000580)=[{&(0x7f0000000480)=""/239, 0xef}, {&(0x7f0000000000)=""/18, 0x12}], 0x2) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x2, 0x1) getsockopt$packet_int(r2, 0x107, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0x4) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) tkill(r3, 0x1d) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ptrace$cont(0x21, r0, 0x0, 0x0) 20:33:33 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x2000, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000200)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x418000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x780124}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x44, r2, 0xf11, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x52b}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4048014}, 0x4) rmdir(&(0x7f0000000580)='./file0\x00') r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r4, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000004}, 0x40000) 20:33:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="2621fcffc66fd9575a4ab6a79325164c"}, 0x1c) 20:33:34 executing program 5: chdir(&(0x7f0000000000)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xf) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@ll, &(0x7f0000000080)=0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x7c, r2, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3c}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffe}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc3}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffd}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x804}, 0x40084) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) setsockopt$inet_opts(r3, 0x0, 0xd, &(0x7f0000000340)="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", 0x1000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2208.097104] audit: type=1400 audit(1549744414.000:9371): avc: denied { map } for pid=10835 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:33:34 executing program 3: r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setattr(r0, &(0x7f0000000140)={0x30, 0x3, 0x0, 0xfffffffffffffff8, 0x6, 0xfff, 0x6, 0x2}, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') socket(0xf, 0x6, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x7, &(0x7f0000000000)='ns/uts\x00', 0xffffffffffffffff}, 0x30) prlimit64(r2, 0xf, &(0x7f0000000080)={0xffffffffffffff00, 0x401}, &(0x7f00000000c0)) ioctl(r1, 0xb702, 0x0) [ 2208.160802] audit: type=1400 audit(1549744414.030:9372): avc: denied { map } for pid=10835 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2208.186462] audit: type=1400 audit(1549744414.040:9373): avc: denied { map } for pid=10835 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:33:34 executing program 2: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="080007000000000040000100240001006c625f68616a785f737461747300000000000000000000000000000000000000080003000b00000008000400880600000800070000000000e4080013d6294e9f20a8e4a5fc3905a8e0f3a27c844f337a28328687ed809590422b35f676769e83271f054b56cef851b5c717fd668ac7a7433aadfb85788c64067fdb94dc570173a35f89e5078b4518334c88fccd36ae0f7d285f649db6802b0751d8781fcb58316a270e003f682083eaedbd685c0850b885cb2e105e8446f209f66569c9033f552e75a5fa27a150e50de7805a19de60ebbc4c5774afcd02e5a34862775965f6f4062622d32e801e6238e87a7087a801000000000000007fb279d4563da0533abf489d3c23cf9ad5f033d3e1e96b80f9f306efaa94e62107c26747531f34dd93fe1608b69ca25c744bbd7df31f5c7dfbb97163fda5d861bd81bb11399f66fb12a2da387a03f8dd33bee7cba7f724b16a5bcc48af8c23922cc1f5980a28dbe0297d0fe1fca55c6f70ed7fe074834596dbf62d19d7c903fa8fbb0969184af2542110293b580e756ec016a413d34d22d9dd36e5ec9fa29a2d8b34125bd435d5b762d963dd8a9f2136f2f937184b5229d72ba13655e29dc86391cc1489d2f176f80c7b8773824202e3e54c925cde75d638700ad40980e4b586c94fd1a354748241269d023ee23759b0b2dbf4e342200eb2bfab878ddebaf137a400979fac78e1d1443b806800000000b8bf7ccaacb724b1b2ddd74e6c75516efe74e189fef59fb06e900d721fded45458ef0e0aaa1814a2858bb36c4832a7520792ee4bca334528baf9003700000000000000f67f0276a139d423d5464bfa47fe0932bce55f6408dfaf5c295c50819549ff363a4b649bb8d55d8fe41ae9576caf7a32f14583eba73d3b9019bbd6cb1b4f5647cff6be2a2900000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) [ 2208.223997] audit: type=1400 audit(1549744414.040:9374): avc: denied { map } for pid=10835 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2208.266859] audit: type=1400 audit(1549744414.070:9375): avc: denied { map } for pid=10845 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2208.318312] audit: type=1400 audit(1549744414.120:9376): avc: denied { create } for pid=10838 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:33:34 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) [ 2208.347351] audit: type=1400 audit(1549744414.120:9377): avc: denied { write } for pid=10838 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2208.376193] audit: type=1400 audit(1549744414.150:9378): avc: denied { map } for pid=10852 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2208.399185] audit: type=1400 audit(1549744414.160:9379): avc: denied { create } for pid=10853 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:33:34 executing program 3: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/ipc\x00') r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl(r1, 0xb, 0x0) r3 = getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000240)={0x800000000000003, r3}) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000040)=0x1, 0x4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, r4, 0xb00, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7d}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x40080}, 0x80) 20:33:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x3c, 0xcd, {"51674e4d32cee8c3143cf9af233a8bd3a406e7916673b5219cc37491f9513fe24f39d592"}}, {0x0, "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"}}, &(0x7f0000001040)=""/162, 0x103e, 0xa2, 0x1}, 0x20) ioctl(0xffffffffffffffff, 0x6, 0x0) 20:33:34 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:33:34 executing program 3: ioctl(0xffffffffffffffff, 0xb702, 0x0) 20:33:34 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') pipe(&(0x7f0000000000)) ioctl(r0, 0xb702, 0x0) 20:33:34 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 20:33:35 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0/../file0\x00', 0x400000, 0x104) r1 = mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x7, 0x10, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000007c0)={0xa8, 0x0, &(0x7f0000000640)=[@transaction={0x40406300, {0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, &(0x7f0000000480), &(0x7f00000004c0)=[0x78, 0x20, 0x28]}}, @register_looper, @reply_sg={0x40486312, {{0x1, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x60, 0x30, &(0x7f00000005c0)=[@flat={0x77682a85, 0x101, r1, 0x2}, @ptr={0x70742a85, 0x0, &(0x7f0000000500), 0x1, 0x1, 0x12}, @fda={0x66646185, 0xa, 0x3, 0x23}], &(0x7f0000000540)=[0x40, 0x68, 0x20, 0x18, 0x78, 0x48]}, 0x3ff}}, @request_death={0x400c630e, 0x3, 0x4}, @enter_looper], 0x89, 0x0, &(0x7f0000000700)="f79c10d519d5a0b31d284c8d736250bb89d793cd83a5b6f051c6c446347a6510ae21ec26b0617f3758fb54cd0c0d7e4b9abff73ef2ee3a12a10235bfbec62a2d5467eebff4d6fafbbb4f68672c40a20e16d08d68523c96e87b190e135ca54a0ac33edf9c47ca8fe7b4a73135d23e0995620916aa09a79fdd1b4c4d079fa3c1fd6aceaa751cb1077b57"}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="e04aeb435afc9966e0d170c74c2c1c213472b27b6faf11925152c29ae5d683072a8cda107897df59178ecb893f8ccd1f35bb0d265309585edcbfc9797e792e42059345e5f0b57c06def2ec3e6e861684e9a1add44f9a24e6e01827b10fa49eb133508fdb89d82a182e6be0acac572a2db74a30b0e974fe3ab14c70cf565d1daa806db6384fd22f31a87cc5f8d2203d431901dc18f5a050f93bec039f7a0ac720bee9d4241aa0419f03ab5f2764ab2450f085b16bd125d09a25e97351b0ab0da7f1d8968ba48bebbd7eb84d6f92f09ab6b48fe774ddc0bd79a4ccde7251eb1a8421d62b9af521c2956866", 0xea, 0x9}], 0x800400, &(0x7f0000000380)={[{@utf8no='utf8=0'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@shortname_win95='shortname=win95'}, {@nonumtail='nnonumtail=1'}], [{@dont_hash='dont_hash'}, {@smackfsfloor={'smackfsfloor', 0x3d, '(:,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'em1}[vboxnet0vboxnet1\'eth1'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfsroot={'smackfsroot', 0x3d, 'security.SMACK64TRANSMUTE\x00'}}]}) poll(0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f0000000800)='./file0/../file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0xffe4, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000480)={0x7, 0x21, 0x1}, 0x7) rmdir(&(0x7f0000000580)='./file0\x00') 20:33:35 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r1 = dup(r0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000080)=0x8) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000000)=""/84) readv(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/58, 0x3a}, {&(0x7f0000000140)=""/83, 0x53}, {&(0x7f00000001c0)=""/154, 0x9a}, {&(0x7f0000000280)=""/164, 0xa4}], 0x4) ioctl(r0, 0xb702, 0x0) [ 2211.090994] kauditd_printk_skb: 60 callbacks suppressed [ 2211.091003] audit: type=1400 audit(1549744416.990:9440): avc: denied { map } for pid=10921 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2211.143996] audit: type=1400 audit(1549744417.050:9441): avc: denied { map } for pid=10923 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:33:37 executing program 5: chdir(&(0x7f0000000000)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0xc) tkill(r0, 0xf) ptrace$cont(0x18, r0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:37 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000180)=0x8) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x9b, "a47caa3c27a5c6b5ea3d5a39469edfabaa4e8fcee2f2ba821ea199dc56061ab919908580e83349fa4790fc53faa59f8ac83e29d7f056432702cf45f41be3ff97aade93e64f0e28fdb068642f7ff42b233d2e51b84e30a8de8fbf846545f4dad52f831f55ec01bc1d40628b7b4b2ce5720998e289e901ed0e54d63f4e53ade9a6a8d1b6091d321ffc058c3c34ad068745a361638180721c94588f38"}, &(0x7f0000000140)=0xbf) ioctl(r0, 0xb702, 0x0) 20:33:37 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(0xffffffffffffffff, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="2621fcffc66fd9575a4ab6a79325164c"}, 0x1c) 20:33:37 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x1f, r1, 0xfffffffffffffffc, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 20:33:37 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="080007000000000040000100240001006c625f68616a785f737461747300000000000000000000000000000000000000080003000b00000008000400880600000800070000000000e4080013d6294e9f20a8e4a5fc3905a8e0f3a27c844f337a28328687ed809590422b35f676769e83271f054b56cef851b5c717fd668ac7a7433aadfb85788c64067fdb94dc570173a35f89e5078b4518334c88fccd36ae0f7d285f649db6802b0751d8781fcb58316a270e003f682083eaedbd685c0850b885cb2e105e8446f209f66569c9033f552e75a5fa27a150e50de7805a19de60ebbc4c5774afcd02e5a34862775965f6f4062622d32e801e6238e87a7087a801000000000000007fb279d4563da0533abf489d3c23cf9ad5f033d3e1e96b80f9f306efaa94e62107c26747531f34dd93fe1608b69ca25c744bbd7df31f5c7dfbb97163fda5d861bd81bb11399f66fb12a2da387a03f8dd33bee7cba7f724b16a5bcc48af8c23922cc1f5980a28dbe0297d0fe1fca55c6f70ed7fe074834596dbf62d19d7c903fa8fbb0969184af2542110293b580e756ec016a413d34d22d9dd36e5ec9fa29a2d8b34125bd435d5b762d963dd8a9f2136f2f937184b5229d72ba13655e29dc86391cc1489d2f176f80c7b8773824202e3e54c925cde75d638700ad40980e4b586c94fd1a354748241269d023ee23759b0b2dbf4e342200eb2bfab878ddebaf137a400979fac78e1d1443b806800000000b8bf7ccaacb724b1b2ddd74e6c75516efe74e189fef59fb06e900d721fded45458ef0e0aaa1814a2858bb36c4832a7520792ee4bca334528baf9003700000000000000f67f0276a139d423d5464bfa47fe0932bce55f6408dfaf5c295c50819549ff363a4b649bb8d55d8fe41ae9576caf7a32f14583eba73d3b9019bbd6cb1b4f5647cff6be2a2900000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:33:37 executing program 0: lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:vmware_device_t:s0\x00', 0x25, 0x1) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x1, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') [ 2211.186973] audit: type=1400 audit(1549744417.060:9442): avc: denied { map } for pid=10924 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2211.212251] audit: type=1400 audit(1549744417.080:9443): avc: denied { map } for pid=10923 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2211.278302] audit: type=1400 audit(1549744417.180:9444): avc: denied { map } for pid=10936 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:33:37 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000040)) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @multicast2}, &(0x7f0000000200)=0xc) bind$packet(r1, &(0x7f0000000240)={0x11, 0xff, r2, 0x1, 0x2}, 0x14) r3 = syz_open_procfs$namespace(r0, &(0x7f0000000100)='ns/uus\x00') ioctl(r3, 0xb702, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x220040, 0x0) [ 2211.353922] audit: type=1400 audit(1549744417.210:9445): avc: denied { map } for pid=10936 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2211.376558] audit: type=1400 audit(1549744417.210:9446): avc: denied { map } for pid=10936 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2211.413469] audit: type=1400 audit(1549744417.210:9447): avc: denied { map } for pid=10936 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:33:37 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000005c0)={0x17, 0x2e, 0x9, 0x4, 0x3, 0x8, 0x5, 0xb7}) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000000580)={@multicast1, @multicast1, 0x0}, &(0x7f0000000140)=0xc) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r1, &(0x7f0000000540)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="ec020000190000e527bd7000fedbdf25fe880000000000000000000000000101000000000000000000000000000000014e2400094e23080902008020bf000000", @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="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"], 0x2ec}, 0x1, 0x0, 0x0, 0x8044}, 0x4000000) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000180)={@remote, 0x17, r2}) lgetxattr(&(0x7f0000000640)='./file0\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="73717374d93ca95a0355d6b2656d2e7d5b406d696d655f747970657b5d2300"], &(0x7f00000006c0)=""/25, 0x19) pipe(&(0x7f0000000600)) [ 2211.462477] audit: type=1400 audit(1549744417.230:9448): avc: denied { create } for pid=10925 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2211.487418] audit: type=1400 audit(1549744417.240:9449): avc: denied { write } for pid=10925 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:33:37 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{0x7, 0x42d7}, {}, {0x4, 0x3}, {0x0, 0x1}]}) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000001c0)='\x00') ioctl(r1, 0xb702, 0x0) ioctl(r1, 0x80000001, &(0x7f0000000000)="5408eb745bac294d1a5192c437c4d8346ccae250f2a4837d7c69a6f55e298d4823b1f706942ba88e3b72f1bb68ffeb094b6732ff954466571e4887ff1bd9cafebdcc672b6f2b6da538dd7b9e8c37bb3117a604a0d6bd757768becf54bd245bc377a388191a1290b32b5cf5bdde3cd4ffbe174d021bdc352045b7c7d73ab12b91bb74a0d75811c4cf4f4788b10a10f50d99facbf54ecdeea32fd19436c1605904071129d60aa8") ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000200)={0x2, 0x7, 0x6}) 20:33:37 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(0xffffffffffffffff, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="2621fcffc66fd9575a4ab6a79325164c"}, 0x1c) 20:33:37 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x100) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0xd, 0x1}, 0x14) accept$inet(r1, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000000c0)=0x10) creat(&(0x7f00000001c0)='./file0\x00', 0x4) ioctl(r0, 0xb702, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000140)={0x0, 0x1, {0x13, 0x25, 0xb, 0x1b, 0x8, 0x7fffffff, 0x5, 0x5, 0xffffffffffffffff}}) 20:33:37 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffff9c, 0x0, 0x7, &(0x7f00000000c0)='ns/uts\x00'}, 0x30) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)="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") ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x7f, 0x4d, 0x3, 0x90, 0x6, r2}) ioctl(r0, 0x80b6ff, 0x0) 20:33:40 executing program 5: chdir(&(0x7f0000000000)='./file0\x00') r0 = socket$inet6(0xa, 0x6, 0x6) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x4e20, 0x7fff, @empty, 0x8}, {0xa, 0x4e20, 0x20, @mcast1, 0x9}, 0x1, [0x40, 0x5, 0x200, 0x3, 0x6, 0x100, 0xaddf, 0x1]}, 0x5c) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xf) ptrace$cont(0x18, r1, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 20:33:40 executing program 2: r0 = socket$inet6(0xa, 0x80803, 0x87) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000000041}, 0xc) getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x90}}, 0xe8) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='netdevsim0\x00') connect$inet6(r0, &(0x7f00000000c0), 0x1c) 20:33:40 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r1 = accept(0xffffffffffffff9c, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000280)={0x1f, 0x39b61c6f, 0x1b16000000000, 0x3}, 0x10) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x101000, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000140)={0x3, 0x1}) openat(r2, &(0x7f00000002c0)='./file0\x00', 0x80401, 0x800000000000000c) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r3) ioctl(r0, 0xb702, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000080)={{0x2, 0x4e24, @broadcast}, {0x306, @random="f5a79ea759c9"}, 0x0, {0x2, 0x4e23, @rand_addr=0x9}, 'veth0\x00'}) 20:33:40 executing program 0: clock_settime(0x7, &(0x7f0000000000)={0x77359400}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x7, 0x1) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100)=0x3, 0x4) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) 20:33:42 executing program 3: r0 = gettid() r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/user\x00') ioctl(r1, 0xb702, 0x0) ptrace$peek(0x2, r0, &(0x7f0000000040)) 20:33:42 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:33:42 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(0xffffffffffffffff, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="2621fcffc66fd9575a4ab6a79325164c"}, 0x1c) 20:33:42 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x400000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) r2 = socket$inet6(0xa, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0xa) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) mkdirat$cgroup(r3, &(0x7f0000000000)='syz1\x00', 0x1ff) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 20:33:42 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x4) lsetxattr$security_ima(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0501110000000081a3de4e076ad3d6fa"], 0x10, 0x3) poll(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) r1 = getegid() stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000007c0), &(0x7f0000000800)=0x0, &(0x7f0000000840)) r4 = getgid() lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)='system.posix_acl_access\x00', &(0x7f0000000880)={{}, {0x1, 0x3}, [{0x2, 0x4, r0}, {0x2, 0x5}], {0x4, 0x4}, [{0x8, 0x2, r1}, {0x8, 0x0, r2}, {0x8, 0x4, r3}, {0x8, 0x4, r4}], {0x10, 0x1}, {0x20, 0x7}}, 0x54, 0x2) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) pwritev(r5, &(0x7f0000000400)=[{&(0x7f0000000100)="1357d290081ecf5532f66d1a4d418d38ad29b7fa4fa9424b36721e0ab07d3920545f49921135b5e5d8df89c48860b0908baf4c3859", 0x35}, {&(0x7f0000000180)="183aa3317ee558198e0a8fb1ca6f7d475e535456ada9c9b85d191340d687e8da1d885002571f24ae3a08dc08a355216c322b0bdac022d845f675b8b8", 0x3c}, {&(0x7f00000001c0)="eec67179275359a02d75fed3bc52c91d621acd5fd97a6d14399cb72fd063379aa5476783ae93d06db4a8a8704458dcbddd69e85e06966f85ed555a12fa4285b3074c76d8c502e74f9c2e443a370e225680e8deeba726e8e3d1f21f8ac5f8dddfa55629e0127ad1bf73e7ec68d61819d1db519556d2c2b0be7afc2bfaa37c52bb2d27023526c81c04093729750b8a4cb27a9f2286c8872737179b2306f47d2ecf30d56a4f686e1a4d9bb7f8c477f28d9b30854814203f703cff4a82b4b180d1298bdfd39ad92cef8cf13299c51cc6c13d9dd200b6bc3f91", 0xd7}, {&(0x7f00000002c0)="98cdce9067b748d64508fc88e37c08c1f37b1c5681918f79faa39c505ebfc7703872abb21872d373ad83fa58d5f37b1a004310a63cab0fa72ce0962007cd9dfa4f0aee5a49ae4225c42fd812fe856768acc3c5394f87ac48adeb53be5b96e4ed1e0615", 0x63}, {&(0x7f0000000340)="ea23f44bfb6db746a34c5a08ae0a463c128125962a1e9bd314847d479bf4a665e3a4ceee4247496a2fbb52d15f519939cc1f15b3d4dc1a1eab807b378dc8d75b", 0x40}, {&(0x7f0000000380)="fb74ebbcd291c1828eb16a5a76bec13a5e084707a0d0ce6e1e0c2356e270a95ed97b46e296658b4e1e55c41b185b38a166aa67706410a131bb00ada24e4f559c2671", 0x42}], 0x6, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 20:33:42 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) [ 2216.717258] kauditd_printk_skb: 33 callbacks suppressed [ 2216.717267] audit: type=1400 audit(1549744422.620:9483): avc: denied { create } for pid=11014 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 [ 2216.776473] audit: type=1400 audit(1549744422.640:9484): avc: denied { map } for pid=11021 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2216.802336] audit: type=1400 audit(1549744422.680:9485): avc: denied { map } for pid=11024 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:33:42 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) r1 = syz_open_pts(0xffffffffffffff9c, 0x200002) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0x2, 0x66e, 0x0, 0xd821, 0x6, 0x7fff, 0x20, 0x9, 0x0, 0x10000}) [ 2216.830907] audit: type=1400 audit(1549744422.680:9486): avc: denied { map } for pid=11024 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2216.912185] audit: type=1400 audit(1549744422.770:9487): avc: denied { write } for pid=11014 comm="syz-executor.2" path="socket:[198214]" dev="sockfs" ino=198214 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 20:33:42 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) getpid() r0 = getpid() r1 = syz_open_procfs$namespace(r0, &(0x7f0000000040)='\xa7\x19&\x1b\xbb\rl\xbd\x93J)G!\x13\xdf\xadHz\b \xb1\x90K\xd1Y\xc9\x1c\x8a1\x06+\xecJ\x03\xd1\x18,^\xc4D\x0e\xca\x9d\xf1\t\xbd\x8a7\xf4\xb4\xe0\x13') ioctl(r1, 0xb702, 0x0) [ 2216.983933] SELinux: policydb magic number 0x90d25713 does not match expected magic number 0xf97cff8c [ 2216.996464] SELinux: failed to load policy [ 2217.000459] audit: type=1400 audit(1549744422.780:9488): avc: denied { write } for pid=11014 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 [ 2217.060201] audit: type=1400 audit(1549744422.790:9489): avc: denied { write } for pid=11014 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 [ 2217.121065] audit: type=1400 audit(1549744422.800:9491): avc: denied { create } for pid=11020 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2217.181192] audit: type=1400 audit(1549744422.800:9492): avc: denied { write } for pid=11020 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2217.237504] audit: type=1400 audit(1549744422.800:9490): avc: denied { write } for pid=11014 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 20:33:43 executing program 5: chdir(&(0x7f0000000000)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffff9c) write$P9_RREMOVE(r0, &(0x7f0000000080)={0x7, 0x7b, 0x1}, 0x7) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xf) ptrace$cont(0x18, r1, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 20:33:43 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000001c0)={0x0, @speck128, 0x0, "914754bae348eaea"}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000280)='/dev/keychord\x00', 0x4000, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000180)={@mcast2, 0x41, r1}) lseek(r0, 0x0, 0x0) 20:33:43 executing program 5: chdir(&(0x7f0000000000)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xf) ptrace$cont(0x18, r0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:43 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/uts\x00') 20:33:43 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'erg\xc7\x1a\xc9w\xea\xd9\xc3\x00'}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x14, &(0x7f0000000040), 0x4) listen(r0, 0x10000) accept(r0, 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000100)=0x6) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000080)=0xc) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) [ 2217.658079] SELinux: policydb magic number 0x90d25713 does not match expected magic number 0xf97cff8c [ 2217.669720] SELinux: failed to load policy 20:33:44 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:33:44 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/llc\x00') ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000040)={'nlmon0\x00', {0x2, 0x4e23, @remote}}) ioctl(r0, 0xb702, 0x0) accept4$packet(r2, &(0x7f0000002340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002380)=0x14, 0x800) sendmsg$nl_route(r2, &(0x7f0000002440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xa041000}, 0xc, &(0x7f0000002400)={&(0x7f00000023c0)=@getstats={0x1c, 0x5e, 0x1, 0x70bd26, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, 0x1}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 20:33:44 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="2621fcffc66fd9575a4ab6a79325164c"}, 0x1c) 20:33:44 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) r0 = inotify_init() r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) socketpair(0x1, 0x1, 0x9, &(0x7f00000009c0)={0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000a00)=@file={0x0, './file1\x00'}, 0x6e) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) poll(&(0x7f0000000080)=[{r0, 0x4000}, {r1, 0x40}, {r3, 0x1090}], 0x3, 0xffff) io_setup(0x4, &(0x7f00000000c0)=0x0) io_cancel(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x399, r0, &(0x7f0000000180)="c16f8519b3e17b26e44bfc0a08d4197f7ea0e4ab6ee822f073c40afcf56a840e067e7bd80517466edc0d2351731a91fd154a91599c4ac0f6f463795b2aa603bc9091548eadce708bb1d322f6f0df5861c9521017b845c55688ca95db6b4b550af3de1e4dd79efbe6f99918f084ff5e39a44ac500069cf0be7685f37457913b152067529e76a3c0fee478d6fc98421bddb1a39fd83500a232aa7b095f75d9c3dd89491f99", 0xa4, 0x3, 0x0, 0x1, r3}, &(0x7f0000000240)) io_cancel(r4, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x1, r3, &(0x7f0000000280)="e55b0654faab70d8b9361cb74a2a14f682f48287187331e3e8cbc41efcc3ab284c5ca49ad4945d7c993cd64d49ce596fdb567564b06c70e08438ed90fb99d264c63498d0ac758141e2e01f5aa5f582354699ae5fc5fbccc7b9d9e04d1fe63eab7b425e9771736dbea86bd4e22d575c7fb198b1efc11b17c832bb38143ed49c5305def79e82a7b01eee3689ea3f8d358a1b840dbe24ad8297bd6d774172d2e1d600a935cf9a08a8771f8899c579b814cbbb1c4a44f1f8ff5facb2f4b4", 0xbc, 0xd21, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000000380)) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') fcntl$setflags(r3, 0x2, 0x1) 20:33:44 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) gettid() 20:33:44 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x4) lsetxattr$security_ima(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="0501110000000081a3de4e076ad3d6fa"], 0x10, 0x3) poll(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) r1 = getegid() stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000007c0), &(0x7f0000000800)=0x0, &(0x7f0000000840)) r4 = getgid() lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)='system.posix_acl_access\x00', &(0x7f0000000880)={{}, {0x1, 0x3}, [{0x2, 0x4, r0}, {0x2, 0x5}], {0x4, 0x4}, [{0x8, 0x2, r1}, {0x8, 0x0, r2}, {0x8, 0x4, r3}, {0x8, 0x4, r4}], {0x10, 0x1}, {0x20, 0x7}}, 0x54, 0x2) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) pwritev(r5, &(0x7f0000000400)=[{&(0x7f0000000100)="1357d290081ecf5532f66d1a4d418d38ad29b7fa4fa9424b36721e0ab07d3920545f49921135b5e5d8df89c48860b0908baf4c3859", 0x35}, {&(0x7f0000000180)="183aa3317ee558198e0a8fb1ca6f7d475e535456ada9c9b85d191340d687e8da1d885002571f24ae3a08dc08a355216c322b0bdac022d845f675b8b8", 0x3c}, {&(0x7f00000001c0)="eec67179275359a02d75fed3bc52c91d621acd5fd97a6d14399cb72fd063379aa5476783ae93d06db4a8a8704458dcbddd69e85e06966f85ed555a12fa4285b3074c76d8c502e74f9c2e443a370e225680e8deeba726e8e3d1f21f8ac5f8dddfa55629e0127ad1bf73e7ec68d61819d1db519556d2c2b0be7afc2bfaa37c52bb2d27023526c81c04093729750b8a4cb27a9f2286c8872737179b2306f47d2ecf30d56a4f686e1a4d9bb7f8c477f28d9b30854814203f703cff4a82b4b180d1298bdfd39ad92cef8cf13299c51cc6c13d9dd200b6bc3f91", 0xd7}, {&(0x7f00000002c0)="98cdce9067b748d64508fc88e37c08c1f37b1c5681918f79faa39c505ebfc7703872abb21872d373ad83fa58d5f37b1a004310a63cab0fa72ce0962007cd9dfa4f0aee5a49ae4225c42fd812fe856768acc3c5394f87ac48adeb53be5b96e4ed1e0615", 0x63}, {&(0x7f0000000340)="ea23f44bfb6db746a34c5a08ae0a463c128125962a1e9bd314847d479bf4a665e3a4ceee4247496a2fbb52d15f519939cc1f15b3d4dc1a1eab807b378dc8d75b", 0x40}, {&(0x7f0000000380)="fb74ebbcd291c1828eb16a5a76bec13a5e084707a0d0ce6e1e0c2356e270a95ed97b46e296658b4e1e55c41b185b38a166aa67706410a131bb00ada24e4f559c2671", 0x42}], 0x6, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 20:33:44 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000140)) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r1, 0xb702, 0x0) 20:33:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x4a, &(0x7f0000000300)={@remote, @link_local, [{}], {@ipv6={0x86dd, {0x0, 0x6, "08d39e", 0x10, 0x0, 0x0, @local, @loopback, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d35d2e", 0x0, "ab5f38"}}}}}}}, 0x0) pwritev(r0, &(0x7f0000000480)=[{&(0x7f0000000100)="9ba3307b29efe6bad47fe0493cf8d14c8b72c61b28769b97985623376d68db0b5138dffdcec369b1442455cf82ea111a05b2bf4e5dd046785b343a7cc5d55d01808b56d313de3d0db634ab6ad5969e1e768e21", 0x53}, {&(0x7f0000000000)="ed47d397d8dab356c2a6a09626d2", 0xe}, {&(0x7f0000000180)="8b1d177f7b996836107c23fa7347545e34213696ae10b105eaf6e302249b179c43ba9b3f85c1172955af144d684a887af2ef4c5de2efe3aeac76d420bf57ee990a393901bb9b66788c32d679ed6b8a044aaf6a21342744c1ea2d28c2153f226eae54c1442f4c8ae8a71b9228883261a5781fb691e0d9353a85f320a5ea3850b233122133a569f50e5d9f71ae0f8a952ed56f083ac8d8bfdb1c", 0x99}, {&(0x7f0000000240)="56a54168512c57bd92b2ebb0e2cc3c30cccc374391538a9dc283d99fd9c4dab2f9dec48d9c246cd908aadfb83167feaab0c447ca8fb2e09f2bbbc462a36c1fcfd4cdde07d30f0445", 0x48}, {&(0x7f0000000380)="3d14cbc7e8d79002bd42bdf5f12f57df158f1e649eb23e6cf38c9fbb8af59d0038060aa5ee31a85b9a9427a658b55ce2875cc864a26b5d5c32e4f07856750c6265eb28dadf29d7ebfb2ae1cc824a846cf89931e48ea0bbf6a096785f5dbf507b4ff7258d33d0467003471614fe31a08e2d101ce2e518e97bbada0d4a91e6e45c84a8fcb2b7612febb6f091b9b0af57c90eb1741ceb483f358d4ef6a6f05cb7bc8f5edb329215a38cfc44b4887a1e75f266cdb77293a98f8d31b77780deda196b9dc43f2d02ea108f3220b3ef5508767bf1584378bf99aa4154199bb07ffb", 0xde}], 0x5, 0x0) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 20:33:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400000, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @multicast1}, {0x0, @remote}, 0x42, {0x2, 0x4e20, @multicast2}, 'bridge_slave_0\x00'}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) r3 = syz_open_procfs$namespace(r2, &(0x7f0000000100)='\xa4') ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000000c0)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000140)={0x0, @aes256, 0x2, "999d0ccc0c5b318f"}) ioctl(r3, 0xb702, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f00000001c0)=0x4, 0x4) 20:33:46 executing program 5: chdir(&(0x7f0000000000)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xf) ptrace$cont(0x18, r0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/connector\x00') ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000280)={{0xffffffffffffffff, 0x1, 0x900000, 0x2, 0x8}, 0x8001, 0x6, 0x3}) r1 = socket(0x400000000010, 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000140)={0x24000000, 0x3f, 0x1}) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000040)=""/202) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x101000, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000340)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000380)=0x0) r6 = getpid() ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000002cc0)) r7 = gettid() lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() sendmsg$netlink(r2, &(0x7f0000002c80)={&(0x7f0000000200)=@kern={0x10, 0x0, 0x0, 0x410}, 0xc, &(0x7f0000002b00)=[{&(0x7f0000000300)={0x24, 0x24, 0x803, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x14, 0x82, @ipv6=@remote}]}, 0x24}, {&(0x7f00000003c0)={0x1430, 0x32, 0x204, 0x70bd2c, 0x25dfdbff, "", [@typed={0x8, 0x10, @fd=r1}, @generic="2199b5051edb55cbec0142420c7f3d86e1f81ea1935e230deb6b00f2fb50b973d02d90593153e1b4f5547bd70fa8f1103ea44e15bab0423af9f1966b2bd2933a2e1466330bd6b78db32d806251edf8caed09569da85781fe15e8c810490a07101c5f60c207c702f17bb4de5e8bb67628f8bbcb9dd615aa7387e99a6705c0a1bfbf57a7319f021169acdd5d81de4377e5935dc9b2fa877d2ead5e563df6c557b6a750bd8e37f7b2a9d4c605fb51a235dd2eb746d7104e182b947c7e07269c7323c7b84beb7a2133680ed682b3899f2c9f5466180403fdd56e556c28ae3f74f511", @typed={0x10, 0x70, @str='/dev/rtc0\x00'}, @typed={0x8, 0x60, @fd=r3}, @typed={0x4, 0x55}, @nested={0x1c, 0x4a, [@typed={0x4, 0x21}, @typed={0x8, 0x8d, @pid=r4}, @typed={0x4, 0x79}, @typed={0x8, 0x51, @pid=r5}]}, @nested={0x10f4, 0x39, [@typed={0xc, 0x27, @u64=0x1}, @generic="76d58173519d24a3c19b5b7a1fc99bb1811a73d41c89d3e8d1a4806e81729eedfa687f3e25cfe67b5d1aa3a2cb7083f69368eee3287cd9c2a97e1b70502b603529f1701db4b3561955e67ee5b76398b58d548d2dd5562e17a020afa34f1cd7571537397319337a2c9f3c92ec5977ae42f0c2d6be565e2e44cb4982636d67e24ced036030c33826549f7466fee76a2e43a35f3911e969e47ef116082aeb7c7feadaf131ce185629e543d91380bb435b32b2d1b5b59029cb7f8923551884a81e105054f7dc", @typed={0xc, 0x1e, @str='\\#\x03]\x00'}, @typed={0x8, 0x1d, @u32=0x10001}, @typed={0x8, 0x8f, @ipv4=@multicast2}, @typed={0x1004, 0x7c, @binary="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"}]}, @generic="75378af7ba012903f2bb5d9262d6b2394a11c58d4699f507506946ff4cc245ceaef57428f30902276b4d941c07db571875388aae7d5cfd31329b83b77528ae15b5b8c98408d378c212a3d5de780ecc30d8cad52bd6081b7281d2f92f990c46d3640a7ab48dd5d4e55f3627af5abd5ec82f22ded7fa5547bbc607d4ac6c11fccfd7e93159607d5af43a8798e551e33c8bf83819e83d15fa6ee1503b119e2e4a9e95be55cf5bde4166babce979f6ac6ff9788bb250073fac095aec333ddc96782d0a7d9102be49f502eb4fc30c67bcb1bec2c0be2b8aa675454bfed1219ee5ac11", @nested={0x12c, 0x25, [@generic="873b7c7cfb95df516c3d6f9c55a31d39f18f04d1970d370e5e40f74af2", @generic="a9c94e5842d4cbed25192bb99a5f4821a36f7bada1901d0173fdcb39853ffc7815a00504b242aefe870583207fb8757fa44ea83fd245819903f88768e8", @generic="b3a08eb5796260ab5569c375bd59ddd203e4955889f1134ba018a29de85de5f3171b5ee91163dbf8f29d72f795aeeed4ba46e4a00a5b248a038deac3da6605ecb5fb0de50ad3bc7ff7e4fc308d5a90995b6869847f25533886d635de38ccdde2532f57bc074baf7ea001b5794483108c82e573e576c5552d1393047a2c1afe0fcfc305f833440b5a12a74695aea984366cec584aaaccae26e75e9a04c93648c2fd88b23aab101629b520cf81f717d5b9e430ae286b7f82ab57649d2b1460d08e27bf2e", @typed={0x8, 0x68, @pid=r6}]}]}, 0x1430}, {&(0x7f0000001800)={0x12d8, 0x2d, 0x101, 0x70bd29, 0x25dfdbfc, "", [@nested={0x12c8, 0x21, [@generic="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", @generic="66a992c7442fea5d8a964a4eb791c843069669b3e232805695ad36aca808af0d2c9042e1511c888b37742b5c66821559f849cbe09a00d0bdfe90b18b3634e3bb276024d9a0fa4872c8503832e4a1f537d6ba3419868fcc7d820706100c1ba502656d76598b341f6121d792bd8112fa769ed7e8bb58062b19b660b54b2e4810c1b84af61b5332402766378da3b2a7d7420f71093bf18051fc9e69c8545b287969aa99ebb1c055203981789277576a6d4697317f3540c05359dd21a15b", @typed={0x14, 0x43, @str='net/connector\x00'}, @generic="d1d84efbafe8ecac9130ce51f894ed1db48f9e831495071da2401e004712b39d3e54b69c210496a73fddf66be30c8a3d401bdf9da3937fc14ed3fd64649f78390580df869a126ac185571a3935b3f134b1ed7484056104206d647df1e5df5f28733e22167336b846da26a02cf8f1176ea856e464a91ffd50ba183d2c9aa612cb18c667c5d1fce8a2d4919b0ec552f33c3954763cc883c2b2dd8c06152f4ce555e127680f88288450dac30f491fde2308c21f676ea54800d408364e04b0d7441a5c8253ee", @typed={0x5c, 0x34, @binary="5eb3f47a2d85759f24f7d7378bc278c7879dc3c08457997c2b034f1fa0de89db85fe69b993b4d5a19858c071549076ca06e312908a14584d16f01bfbe268f32bc8284209ab7c7fd9446eb8a1f77df042fd3adb1044560c"}, @generic="4dbff48e762233d9f27f27d3790ac8e6a18ec6a82b824888bd4a8143b4bab3b5d7444e50d079455e5cfd02fc4dc160fa14c50b128baa62b270b1c46c2a2a9b5c03492a97491d3fef745e297076ee54c118ad8b6f3c8a7ce4e50709d07868bbed8a03af58b1f05b45bd5a2d8eef8d6292349cd5cbf922dd8a87880c07050c89591c916e389586e1928b8ed070bf96551493bc152bd2ab1598331e85ea84ff414aa0e9d14ed46ed6d5cce7b887d13c251a75228e62920820afec275fce7bad75df2bf1be1a8ef64a8ea4d4cd9ffc9be1997aa8"]}, @generic]}, 0x12d8}], 0x3, &(0x7f0000002c00)=[@cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x20, 0x1, 0x1, [r1, r2, r3]}, @rights={0x28, 0x1, 0x1, [r1, r1, r0, r1, r1]}], 0x68, 0x4}, 0x0) write(r1, &(0x7f0000000240)="2400000021002551071c0165ff01fc020200000700100f000ee1000c08000a0000000000", 0x24) 20:33:46 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="2621fcffc66fd9575a4ab6a79325164c"}, 0x1c) 20:33:46 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000040)="76b5de35b547ddc50dbe8185f60aabdc150e8042a686aacdd5405aff8b0d50eeeda583477f92daca60275586c40356613a6c612c7204cb4f1d6e08c36ae57e28be0260b83bd0e4c3b452b32170", 0x4d, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') listen(r0, 0xfffffffffffffff8) 20:33:46 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl$RTC_VL_CLR(r0, 0x7014) ioctl(r0, 0xb702, 0x0) 20:33:46 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="080007000000000040000100240001006c625f68616a785f737461747300000000000000000000000000000000000000080003000b00000008000400880600000800070000000000e4080013d6294e9f20a8e4a5fc3905a8e0f3a27c844f337a28328687ed809590422b35f676769e83271f054b56cef851b5c717fd668ac7a7433aadfb85788c64067fdb94dc570173a35f89e5078b4518334c88fccd36ae0f7d285f649db6802b0751d8781fcb58316a270e003f682083eaedbd685c0850b885cb2e105e8446f209f66569c9033f552e75a5fa27a150e50de7805a19de60ebbc4c5774afcd02e5a34862775965f6f4062622d32e801e6238e87a7087a801000000000000007fb279d4563da0533abf489d3c23cf9ad5f033d3e1e96b80f9f306efaa94e62107c26747531f34dd93fe1608b69ca25c744bbd7df31f5c7dfbb97163fda5d861bd81bb11399f66fb12a2da387a03f8dd33bee7cba7f724b16a5bcc48af8c23922cc1f5980a28dbe0297d0fe1fca55c6f70ed7fe074834596dbf62d19d7c903fa8fbb0969184af2542110293b580e756ec016a413d34d22d9dd36e5ec9fa29a2d8b34125bd435d5b762d963dd8a9f2136f2f937184b5229d72ba13655e29dc86391cc1489d2f176f80c7b8773824202e3e54c925cde75d638700ad40980e4b586c94fd1a354748241269d023ee23759b0b2dbf4e342200eb2bfab878ddebaf137a400979fac78e1d1443b806800000000b8bf7ccaacb724b1b2ddd74e6c75516efe74e189fef59fb06e900d721fded45458ef0e0aaa1814a2858bb36c4832a7520792ee4bca334528baf9003700000000000000f67f0276a139d423d5464bfa47fe0932bce55f6408dfaf5c295c50819549ff363a4b649bb8d55d8fe41ae9576caf7a32f14583eba73d3b9019bbd6cb1b4f5647cff6be2a2900000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:33:46 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0x4, &(0x7f0000000000)="bfcb7291578ffad5194c146e0fdabec8fca1bca0d0280969d03e3712b20d2e47832660ef51395d76e74af86622acb26fe4d003ac6bcd85c4b15273cb07df9da20c3969108b769dc62db194298443e7cf723b0a455b4408416cf1bc0509f97200d77a9c94c9de69e554ab62edcc1a3db76c33f76cd1b0479a405da6a4b35af73dbec273c09d36d55d1722213e45b1a69d38d69d14e31bc2cef27d02124140fbd6675416dc244b1deab28e9450d99efcd4a3826301e926431a5db7") ioctl(r0, 0xb702, 0x0) 20:33:46 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f00000000c0)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'nr0\x00', 0x3}, 0x18) 20:33:46 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000700)={'bcsf0\x00', {0x2, 0x4e24, @remote}}) r2 = dup2(r0, r0) getsockopt$inet_udp_int(r2, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000080)=""/96) ioctl(r0, 0x8, 0x0) 20:33:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x20000004e20}, 0x1c) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x4000, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 20:33:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000040)=0x100000001, 0x4) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) tkill(r2, 0x31) r3 = signalfd4(r1, &(0x7f0000000000)={0x10000}, 0x32f, 0x0) tkill(r2, 0x31) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) read(r3, &(0x7f0000000080)=""/128, 0xae3f1a6) 20:33:46 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x80, 0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f00000001c0)='ns/uts\x00\xe4\xb7\x96\xb4<\x16]q\x04\xfb\xcc\x11\xbf\x00q9K@\xa1it\v\xf6\xcd\b\xe3\x7f\xabF,_I<\x196\xe7\xa0\x89\x85\xc5\xb9\x87\xb6\xbd5\xfa0\xf5t\xa1L<\n\x1c\xe7\xe4\xe4\x81\x8d1=H\xe6D\xd7\x1f\x12\x8f\td\x9f_') r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000000)=r0) ioctl(r1, 0xb702, 0x0) 20:33:49 executing program 5: chdir(&(0x7f0000000000)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xf) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x2, 0x10000, 0xffff, 0x6, 0x2, 0x3f, 0x1ff, 0x78, 0x38, 0x245, 0x9, 0x5, 0x20, 0x2, 0x8, 0x8, 0x7}, [{0x7, 0x4, 0x9, 0x3, 0x1, 0x8, 0x4, 0x2}, {0x60000000, 0x2, 0x3, 0x9, 0x3e, 0x4, 0x4, 0x4}], "0ce7cb569f255cbb88b15f2462fbb42aadedb78df8fab8bb5f3f353ef3ca158e67c8442e156a646126f5bca7cfabb6ccf885c83e34c21c5d2a9da7895e8556b73c46f50d328895d3e736c85273befda24a2d711d5b86ccacc8bece891dec92bf078bc04623b0b2efe431e165ad5b44e00de8e4d6272160ee265608702a985a28f6694ae7e3cc0b7f5734f7967e1f7cdd1239db62", [[], [], []]}, 0x40c) ptrace$cont(0x18, r0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) symlink(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='./file0\x00') ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:33:49 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x1, 0x1, 0x3}) ioctl(r0, 0xb702, 0x0) 20:33:49 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x2b4102, 0x125) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r1, 0x0, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x7, @bearer=@udp='udp:syz0\x00'}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x14) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000180)=0x3eceff06) syz_emit_ethernet(0x2e, &(0x7f00000001c0)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev, @remote, {[@timestamp={0x44, 0x4, 0x9cc, 0x3}]}}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 20:33:49 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="2621fcffc66fd9575a4ab6a79325164c"}, 0x1c) 20:33:49 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') [ 2223.614565] kauditd_printk_skb: 131 callbacks suppressed [ 2223.614574] audit: type=1400 audit(1549744429.520:9624): avc: denied { create } for pid=11170 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2223.701384] audit: type=1400 audit(1549744429.520:9625): avc: denied { write } for pid=11170 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2223.757136] audit: type=1400 audit(1549744429.530:9626): avc: denied { map } for pid=11175 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2223.785003] audit: type=1400 audit(1549744429.530:9627): avc: denied { read } for pid=11170 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2223.809057] audit: type=1400 audit(1549744429.560:9628): avc: denied { create } for pid=11170 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2223.833907] audit: type=1400 audit(1549744429.560:9629): avc: denied { write } for pid=11170 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2223.858106] audit: type=1400 audit(1549744429.560:9630): avc: denied { map } for pid=11177 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2223.880449] audit: type=1400 audit(1549744429.570:9631): avc: denied { map } for pid=11177 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2223.903236] audit: type=1400 audit(1549744429.590:9632): avc: denied { map } for pid=11176 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2223.926019] audit: type=1400 audit(1549744429.600:9633): avc: denied { map } for pid=11176 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:33:52 executing program 2: fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000180)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') fchdir(r0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200000, 0x22) fstat(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000006c0)) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000600), 0x0) getrandom(&(0x7f0000000380)=""/53, 0x35, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000040)={@loopback, @multicast2}, &(0x7f0000000280)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="0000fffff2ffffff00000000200008001c00010000000000000000000100000000000000000000000a000000080001006868660004000200"], 0x1}}, 0x4800) lsetxattr$security_ima(&(0x7f0000000340)='./file1\x00', &(0x7f0000000400)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "75d0796572f91920f62991f85b71434fc2493e9e"}, 0xffffffffffffff74, 0x2) syz_emit_ethernet(0x7e, &(0x7f00000001c0)=ANY=[@ANYBLOB="0180c200000fffffffffffff0a00450000700000000000019078ac2314bbac1414110304907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], 0x0) prctl$PR_CAPBSET_READ(0x17, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'rose\xd2\x00', 0x3}) 20:33:52 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="02042dbd7000fc000c000200080002004e200015080004004d00000014000100080005000000000008000900770000003000030414000600005a45efe7060000000000000000ffffffffffff08000500ac1414bb0801080600000000080007004e2100005d000407fd844378fd536307379e023b0057cc8d237c282918bf40128fdd6d3b9ac482627a4173f3d26080b3c8b5214ac76597d9a4d5c5f058fbaf5db704622f62cc1af932e0528eb34a90a84ac1c603a85d273d347ff41a975e64c21ed24b7c3f1596b3a3b5cf68f308b7a38dd4b1daf82a3b87278b21c0492bed58e01e7d4783050000004ca3b4c5fae4639ab635054f469722e95dada1f361a949d0ee460e313674d470024bb54db260eda4974fb622698c2fc2596bdaa96040ca178df4d5757fb1257c3001000000000000002ca33d107e770f50c11f8938e560522aa795b7c84cf2de19d16e42046de61e3775326e9ab668ac894a6598cd1b85c9e18cef07fd016f12c89e37719a5b39777f18a1634fa8772cee025e11d36fda12a3359a014e784ef0a0ca7c41feb23ac0926b953c9a4f9a7f77e64e49b083559a2e4f7014d036968a351fb5f8c3abb2c2db422c041c5533518615a07413afe59cdf2d55da68"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:33:52 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0xe5, 0x40) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) statx(r0, &(0x7f0000000040)='./file0\x00', 0x4000, 0x1, &(0x7f0000000180)) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x158, r1, 0xf1a, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdad}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffffffffffff}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x464d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff00000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) rmdir(&(0x7f0000000580)='./file0\x00') 20:33:52 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="2621fcffc66fd9575a4ab6a79325164c"}, 0x1c) 20:33:52 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000208}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x58, r2, 0x431, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x507}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x40000000000}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4800000000000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe3ad}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x10) 20:33:52 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101000, 0x0) fstatfs(r0, &(0x7f0000000140)=""/249) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r1, 0xb702, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:33:52 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0206000007000000000000000000000005001a00ff0100000000000000000000002300ff0700000000000000000000007e03000000000000"], 0x38}}, 0x0) 20:33:52 executing program 5: chdir(&(0x7f0000000000)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) r0 = dup(0xffffffffffffff9c) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000340)) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xf) ptrace$cont(0x18, r1, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000080)={0x1000}, &(0x7f0000000140), &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x8) creat(&(0x7f0000000040)='./file0\x00', 0x0) iopl(0x100) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000380)=0x100) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0xfffffffffffffffc, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$poke(0x5, r1, &(0x7f0000000200), 0xffff) ptrace$cont(0x20, r1, 0x0, 0x0) 20:33:52 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x111000, 0x6) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14, 0x69, 0x2, {0x4c}}, 0x14) r2 = dup(r0) statx(r2, &(0x7f0000000000)='./file0\x00', 0x100, 0x10, &(0x7f0000000140)) 20:33:52 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="2621fcffc66fd9575a4ab6a79325164c"}, 0x1c) 20:33:52 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400000, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r3 = dup(r1) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)) r4 = syz_open_pts(r2, 0x805) r5 = dup3(r4, r3, 0x0) write$UHID_INPUT(r5, &(0x7f00000036c0)={0x8, "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", 0x1000}, 0xda70a876) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 20:33:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x4, 0x4, 0x9}, 0x2c) r1 = dup2(r0, r0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x0) tee(r1, r1, 0x8, 0xb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x741000, 0x0, 0x10020000000, 0x0}, 0x2c) 20:33:52 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) ioctl$int_in(r0, 0x5421, &(0x7f0000000200)=0x100) unshare(0x40600) getsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14}, 0x14) 20:33:58 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:33:58 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000014c0)) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) preadv(r2, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000002580)='nbd\x00') mlockall(0x0) r4 = inotify_init() sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000001480)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x200000}, 0xc, 0x0}, 0x90) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x4) write$binfmt_elf64(r5, &(0x7f0000004000)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0], 0x29) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r5, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x54, r6, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1b}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xd49d4c}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendfile(r5, r5, &(0x7f00000001c0), 0xa19b) preadv(r2, &(0x7f00000024c0)=[{&(0x7f0000000000)=""/181, 0xb5}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000140)=""/84, 0x54}, {&(0x7f0000002340)=""/52, 0x34}, {&(0x7f0000002400)=""/165, 0xa5}], 0x5, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000001680)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x4000004}, 0xc, &(0x7f0000001640)={&(0x7f0000001580)={0x88, r3, 0x10, 0x70bd2a, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r5}, {0x8, 0x1, r5}, {0x8, 0x1, r2}, {0x8, 0x1, r4}, {0x8, 0x1, r5}]}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r5}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r5}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x40) 20:33:58 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @dev}, &(0x7f0000000240)=0x10) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x4) fcntl$setstatus(r1, 0x4, 0x800) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)=0x0) sched_getattr(r2, &(0x7f0000000340), 0x30, 0x0) ioctl(r0, 0xb702, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x400002, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e22, 0x100000000, @empty, 0x6}, {0xa, 0x4e24, 0x9, @loopback, 0x9}, 0x6, [0x8000, 0x1, 0x4, 0x30, 0x4, 0x800, 0x3f, 0x10001]}, 0x5c) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x20042, 0x18a) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f0000000140)=""/165) 20:33:58 executing program 5: chdir(&(0x7f0000000000)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xf) ptrace$cont(0xe8a90aa53ad13d0c, r0, 0x3, 0xec) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r2, 0x308, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}]}, 0x2c}}, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) unshare(0x0) 20:33:58 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="2621fcffc66fd9575a4ab6a79325164c"}, 0x1c) 20:33:58 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v1={0x2, "bcc3e81b25b9eb8827"}, 0xa, 0x1) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') [ 2233.103667] kauditd_printk_skb: 54 callbacks suppressed [ 2233.103676] audit: type=1400 audit(1549744439.010:9688): avc: denied { map } for pid=11267 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:33:59 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$P9_RLERRORu(r1, &(0x7f0000000040)={0x14, 0x7, 0x1, {{0x7, 'ns/uts\x00'}}}, 0x14) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)) ioctl$TIOCSBRK(r1, 0x5427) [ 2233.175763] audit: type=1400 audit(1549744439.010:9689): avc: denied { create } for pid=11270 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:33:59 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="2621fcffc66fd9575a4ab6a79325164c"}, 0x1c) [ 2233.203762] audit: type=1400 audit(1549744439.010:9690): avc: denied { write } for pid=11270 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2233.230379] audit: type=1400 audit(1549744439.010:9691): avc: denied { map } for pid=11271 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2233.252927] audit: type=1400 audit(1549744439.010:9692): avc: denied { read } for pid=11270 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2233.279617] audit: type=1400 audit(1549744439.010:9693): avc: denied { create } for pid=11262 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=rawip_socket permissive=1 [ 2233.302821] audit: type=1400 audit(1549744439.010:9694): avc: denied { create } for pid=11261 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2233.333768] audit: type=1400 audit(1549744439.010:9695): avc: denied { write } for pid=11261 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:33:59 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') [ 2233.376257] audit: type=1400 audit(1549744439.040:9696): avc: denied { map } for pid=11276 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2233.398511] audit: type=1400 audit(1549744439.040:9697): avc: denied { map } for pid=11277 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:33:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x1) ioctl(0xffffffffffffffff, 0xb702, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x191000, 0x0) 20:33:59 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$smack_current(r0, &(0x7f00000000c0)='^proc\x00', 0x6) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0xa00, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="246e91ff34c0c20400005200200026bd7000fcdbdf250a08000300000000000800060002000000000000"], 0x24}, 0x1, 0x0, 0x0, 0x8081}, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r3 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0x1f, 0x2, 0x1, r3}) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) 20:33:59 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="2621fcffc66fd9575a4ab6a79325164c"}, 0x1c) 20:34:00 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="02042dbd7000fc000c000200080002004e200015080004004d00000014000100080005000000000008000900770000003000030414000600005a45efe7060000000000000000ffffffffffff08000500ac1414bb0801080600000000080007004e2100005d000407fd844378fd536307379e023b0057cc8d237c282918bf40128fdd6d3b9ac482627a4173f3d26080b3c8b5214ac76597d9a4d5c5f058fbaf5db704622f62cc1af932e0528eb34a90a84ac1c603a85d273d347ff41a975e64c21ed24b7c3f1596b3a3b5cf68f308b7a38dd4b1daf82a3b87278b21c0492bed58e01e7d4783050000004ca3b4c5fae4639ab635054f469722e95dada1f361a949d0ee460e313674d470024bb54db260eda4974fb622698c2fc2596bdaa96040ca178df4d5757fb1257c3001000000000000002ca33d107e770f50c11f8938e560522aa795b7c84cf2de19d16e42046de61e3775326e9ab668ac894a6598cd1b85c9e18cef07fd016f12c89e37719a5b39777f18a1634fa8772cee025e11d36fda12a3359a014e784ef0a0ca7c41feb23ac0926b953c9a4f9a7f77e64e49b083559a2e4f7014d036968a351fb5f8c3abb2c2db422c041c5533518615a07413afe59cdf2d55da68"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2}, &(0x7f0000005480)=0xc) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:34:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, 0x0, &(0x7f0000000140)) 20:34:00 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00\xf0B\xe5\xd6Xw\xfb\x98') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) ioctl(r0, 0x20000000000b, 0x0) 20:34:02 executing program 5: chdir(&(0x7f0000000000)='./file0\x00') clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xf) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0xfffffffffffffffe, 0x0, 0x1ffffffc, 0x54}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 20:34:02 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="2621fcffc66fd9575a4ab6a79325164c"}, 0x1c) 20:34:02 executing program 0: poll(0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 20:34:02 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/net\x00') 20:34:02 executing program 2: 20:34:02 executing program 2: 20:34:02 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000000)=@tipc=@name, &(0x7f0000000080)=0x80) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000000c0)={0x101}, 0x4) 20:34:02 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) 20:34:02 executing program 2: [ 2239.202897] kauditd_printk_skb: 58 callbacks suppressed [ 2239.202906] audit: type=1400 audit(1549744445.110:9756): avc: denied { map } for pid=11363 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2239.244605] audit: type=1400 audit(1549744445.140:9757): avc: denied { map } for pid=11363 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:06 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2}, &(0x7f0000005480)=0xc) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:34:06 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000140)) r2 = openat(r1, &(0x7f0000000240)='./file0\x00', 0x12001, 0x88) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x7f) ioctl(r0, 0xb702, 0x0) getcwd(&(0x7f0000000080)=""/65, 0x41) pipe2(&(0x7f0000000000), 0x800) lookup_dcookie(0xffffffffffffffc0, &(0x7f0000000280)=""/151, 0x97) 20:34:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 20:34:06 executing program 2: 20:34:06 executing program 1: 20:34:06 executing program 5: 20:34:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x816, &(0x7f0000000100)) 20:34:06 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001400)=[{0x0}, {&(0x7f0000001200)=""/57, 0x39}, {0x0}, {&(0x7f00000012c0)=""/36, 0x24}, {&(0x7f0000001380)=""/80, 0x50}], 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000adc3994900000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf"], 0x2e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 2240.224651] audit: type=1400 audit(1549744446.130:9758): avc: denied { map } for pid=11370 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:06 executing program 3: r0 = gettid() r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000040)={0x0, 0x2, 0x66b, 0x40, 0xda1, 0x3}) r2 = syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/pid_for_children\x00') ioctl(r2, 0xb702, 0x0) 20:34:06 executing program 1: fcntl$notify(0xffffffffffffffff, 0x402, 0x0) clone(0xa000a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffbfffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x7, 0x4, @tid=r0}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000002c0)=[{}], 0x1, 0x0, 0x0, 0x0) [ 2240.299289] audit: type=1400 audit(1549744446.160:9759): avc: denied { map } for pid=11370 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2240.326698] audit: type=1400 audit(1549744446.160:9760): avc: denied { map } for pid=11370 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2240.352467] audit: type=1400 audit(1549744446.160:9761): avc: denied { map } for pid=11370 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2240.379877] audit: type=1400 audit(1549744446.190:9762): avc: denied { map } for pid=11375 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2240.403705] audit: type=1400 audit(1549744446.200:9763): avc: denied { map } for pid=11375 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2240.429147] audit: type=1400 audit(1549744446.290:9764): avc: denied { create } for pid=11371 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:34:06 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x800000018, &(0x7f0000000380)=0x800, 0x4) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x80, 0x0}, 0x8003) sendmsg(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000500)="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", 0x7d1}], 0x1}, 0x8000) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) [ 2240.462046] audit: type=1400 audit(1549744446.290:9765): avc: denied { write } for pid=11371 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:34:06 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x900, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ns/uts\x00', r0}, 0x10) ioctl(r1, 0x800, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) 20:34:11 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2}, &(0x7f0000005480)=0xc) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:34:11 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1d, 0x1, 0x7f) r1 = syz_open_procfs(0x0, &(0x7f0000000e00)='\xc4net/dev_m\xd8\x8b!,\'^\x83l\xfb\xe1\x95s\xf7pA@\xbe\xaf\xbe\xf2\x039\x01\xb7\x8d8\xca\xf8\xde\x1c\x9a\xfa=Q]3\xd9\x00\x1f#U\x10;(\x90y\b\x00h\xce_\x80Q\xd957s0\x82\xef\x85/%\x88\x16\xc1W\xc5\xd9\r\x1a\x97g\xdd\x9d\xfe\x11\x04C\xed\xdb\x97&\xb5\x9f\x14N\xac\xa3\xe7\t\x86l\x9b\xfd\xd8v\x90X\xc2\x90\x87\x8d\xfb\x0f\xa4rJ\xd1p\x901\\\xa4?\xb5\x97\x80\xe0\x12\xa0\x17X%j[\x11\xcdyW+\x82>\xd1&\xf7\x06\xc4\xf1[\xa5\x0fl\xa1c Vg\x05\x1d\x1a\xc0r\xc6l\x9a\xcf^\x89?\xaf0\xe2\x16\xb5\x8b\x82\xfaq\xf1\x0e\xca\xea\xcfj\xe0\x92\n\xc5\xad8\xde\x15E\xf2\xe3\x1c\xba\x83_\x7fu\xf2H\b\xce\xfd\xdeZX\xdb\x1e\xe0\xc4\x05u\xe3P\xe8\xed4\xb3\xfd\xb18\x10\xf1&$\xca\x9du\x8c\xc3\xc0\xe0N\nQ\xbe\xcb(\xaf\xcf;eg\xa6\xef\xc2s[\x92\xdb\xa5\"\x02\x1b\xd6\xed\xadk\xdd&\xa7\xebU\x7f\xd9\xe8n\xc8\x80\xce\x942u\x0e\xef$4*<\xec\xc9#\x7f(\x1a\xa9K\xa2\x7f+\xb6.K_\xb7\xed\v\x88wk\n\xbb\xa0\x12\xfcG\xdc`V5\xfbcT\xf1\xd6Ljyx\"1\x97\xafH\xfe.\x9aH\xbc^d.]\x11\xc5\x87o\xdf\xe7\x11ta\xfc\xa4e\x00-kz\x02\x88\xe3\xe9\ffk\x02\xf2\x98\xb8Y\xad\xe4\xd8\x96\x99tj\xb5b\x7fpO\xff\xc1@\x01\xf0\x10\xb8\xcc\xe5\x8b\x94\xb8x\x91(\x14\x05\x7f\xbb\xf1\x17\x02{\x8f\xb9\x03\xcf\x93\x1c~y\xd5\xc6\xaeU\x0f\x97\xf8\xb9') getdents(r1, &(0x7f00000000c0)=""/47, 0x369) socket(0x0, 0x0, 0x9) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x14003) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1ffffd, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000003740)=[{0x0}, {&(0x7f0000001540)=""/4096, 0x1000}, {0x0}, {&(0x7f0000003600)=""/35, 0x23}, {&(0x7f0000003640)=""/220, 0xdc}], 0x5, 0x0) write$P9_RSETATTR(r3, &(0x7f00000002c0)={0x7, 0x1b, 0x2}, 0x7) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000280)='./file0\x00') r5 = socket$inet_udplite(0x2, 0x2, 0x88) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000340)) exit_group(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) sched_getaffinity(0x0, 0x34976eff02c1a010, &(0x7f0000000400)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000200)) unshare(0x4000000) r6 = fcntl$getown(r4, 0x9) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000440)={[], 0x9, 0x800, 0x3, 0x401, 0x80000001, r6}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r5, 0x0) 20:34:11 executing program 5: ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0xfffffffffffffdba, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000280)=@abs, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountstats\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 20:34:11 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='oz,$\r\x00\x00\x00\x00\x00\x00\x00\x00\x11\xe0\xff\x00\x00') ioctl(r0, 0x4, 0x0) 20:34:11 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0xffffffffffffffd6, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 20:34:11 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000000)='system_u:oo\xe5\x1e]\x1e\xd5+\xc7e_t:s\x18\x00', 0x19) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) 20:34:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x400, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r1, 0x3}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) ioctl(r2, 0xb702, 0x0) [ 2245.469924] kauditd_printk_skb: 14 callbacks suppressed [ 2245.469933] audit: type=1400 audit(1549744451.370:9780): avc: denied { map } for pid=11417 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:11 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x8ff8, 0x4) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) read(r1, &(0x7f00000000c0)=""/20, 0x14) fallocate(r2, 0x1, 0x0, 0x10000101) times(&(0x7f0000000240)) [ 2245.567761] audit: type=1400 audit(1549744451.420:9781): avc: denied { map } for pid=11421 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:11 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0x8, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4a8000, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x101) [ 2245.619466] audit: type=1400 audit(1549744451.430:9782): avc: denied { map } for pid=11421 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2245.647990] audit: type=1400 audit(1549744451.440:9783): avc: denied { map } for pid=11422 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getstats={0x1c, 0x5e, 0x400, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r1, 0x3}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) ioctl(r2, 0xb702, 0x0) [ 2245.698920] audit: type=1400 audit(1549744451.450:9784): avc: denied { map } for pid=11422 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:11 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xf, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) [ 2245.789128] audit: type=1400 audit(1549744451.450:9785): avc: denied { map } for pid=11422 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e26, 0x0, @rand_addr, 0x400000000000}, 0xfffffffffffffd21) recvmmsg(r1, &(0x7f0000009400)=[{{&(0x7f00000001c0)=@alg, 0x80, 0x0}}], 0x1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 2245.871604] audit: type=1400 audit(1549744451.460:9786): avc: denied { create } for pid=11425 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2245.906094] audit: type=1400 audit(1549744451.460:9787): avc: denied { write } for pid=11425 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2245.932379] audit: type=1400 audit(1549744451.480:9788): avc: denied { create } for pid=11425 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2245.996987] audit: type=1400 audit(1549744451.500:9789): avc: denied { write } for pid=11425 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:34:17 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00'}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:34:17 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="f0000000292000042500000000000000000000008f3316575297464e450b81f64740072dde74483c3196da1baab46f9c94ab365b954202d4ceede4274856d2bfe09668a01d6d09876d8c9a4c45beb5df07f5a934824c185259e15d6aa5d5ed47b0d30cd5fa614b0e906265bde45ee0b7", @ANYRES32=r1, @ANYBLOB="0300080003000d000000050008000100647272000c000200080001000000000008000500040000000c000100686673630000000094000200100001000100000008000000030000001000020081000000fcffffff008000001000030000000000060000000300000010000300e40000000000000081000000100001000200000002000000fbffffff10000300260d0000000000000100000010000200ff070000ff0700000600000010000300060000001a0000000000000010000100000000000500000000feffff08000500000500000800050000080000"], 0xf0}, 0x1, 0x0, 0x0, 0x41}, 0x1) poll(0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 20:34:17 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x40000) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840), 0x0, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xca100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r3, 0x0, 0x101, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000004}, 0x4000080) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x25fbf489) accept4(r1, &(0x7f0000000000)=@rc, &(0x7f0000000080)=0x80, 0x0) connect$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 20:34:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x7, 0x4) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000080)) 20:34:17 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x50000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0xf0, r2, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffffffffffffff59}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fffffff}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xd79}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x80}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8000}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xc24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xa587}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x79}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1f}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0xf0}, 0x1, 0x0, 0x0, 0x880}, 0x0) ioctl(r0, 0xb702, 0x0) write$binfmt_misc(r1, &(0x7f0000000280)={'syz1', "2c11daccd790737cbdf18bb9f7a9e1d53119d10becd8f534653ef74d0f95a1ed973a0f81ca2a2d04bb9d0d2f59e1f421fb7d1f7e7bd4115d3cf2a4ca2f1ebb276210c1d9c902e8371cf3c9d312da1f826fde1e4c875161520960ab20666567d10f229fdbe416608f6159a12c84d9ae98e2b9398b67d0cdb8ef691a898cdaa50197c4c68fc9021ec6"}, 0x8c) 20:34:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x80007, 0xfffffffffffffffd) connect$inet6(r1, 0x0, 0x0) 20:34:17 executing program 2: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() setreuid(r0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8000000000000a, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) accept4$inet6(r1, 0x0, &(0x7f0000000100), 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x26e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xc62d, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f000000ac80), 0x400000000000302, 0x4008800) setsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f00000000c0)=0xffff, 0x4) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x200001, 0x0) accept$packet(r2, 0x0, &(0x7f0000000180)) ioprio_set$uid(0x3, r0, 0x0) [ 2251.769644] kauditd_printk_skb: 22 callbacks suppressed [ 2251.769654] audit: type=1400 audit(1549744457.670:9812): avc: denied { create } for pid=11465 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:34:17 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/uts\xbe\r\\O\x00') ioctl(r1, 0xb702, 0x0) [ 2251.832786] audit: type=1400 audit(1549744457.670:9813): avc: denied { write } for pid=11465 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2251.904056] audit: type=1400 audit(1549744457.680:9814): avc: denied { map } for pid=11473 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2251.933158] audit: type=1400 audit(1549744457.710:9815): avc: denied { read } for pid=11465 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2252.008781] audit: type=1400 audit(1549744457.720:9816): avc: denied { create } for pid=11465 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:34:18 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x181000, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x54) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) accept4(r1, &(0x7f00000001c0)=@in={0x2, 0x0, @dev}, &(0x7f0000000000)=0x80, 0x800) [ 2252.087534] audit: type=1400 audit(1549744457.720:9817): avc: denied { write } for pid=11465 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2252.115260] audit: type=1400 audit(1549744457.730:9818): avc: denied { map } for pid=11479 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2252.198730] audit: type=1400 audit(1549744457.740:9820): avc: denied { read } for pid=11465 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:34:18 executing program 3: getpid() r0 = gettid() r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid\x00') ioctl(r1, 0xb702, 0x0) 20:34:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2e, 0x55}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) r1 = openat(0xffffffffffffffff, &(0x7f0000000380)='\x00', 0x1, 0x101) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioprio_set$pid(0x2, r2, 0x4) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000003c0), 0x10) [ 2252.277517] audit: type=1400 audit(1549744457.730:9819): avc: denied { create } for pid=11464 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2252.336726] audit: type=1400 audit(1549744457.760:9821): avc: denied { write } for pid=11464 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:34:18 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREMOVE(r2, &(0x7f0000000080)={0x7, 0x7b, 0x2}, 0x7) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000000)={0x2, 0x20, 0x1, 0x5, 0x10000, 0x100}) readlinkat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4096, 0x1000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000001140)=[@window={0x3, 0x4, 0x1}, @mss={0x2, 0x8}, @window={0x3, 0x4, 0x1f}], 0x3) ioctl(r0, 0x7, 0x0) 20:34:19 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0x10000000000eff, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0), 0x10) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) 20:34:19 executing program 5: unshare(0x40400) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000280)={{0x0, @remote, 0x4e20, 0x0, 'lc\x00'}, {@initdev}}, 0x44) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)}, 0x0) preadv(r2, &(0x7f00000017c0), 0x239, 0x3fffffffffff) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000000)={'mangle\x00', 0x3d, "c9fcc4b5c4179d53024df82dceb9f309f0c7ef51829c326e22be73e5559d7e7c1d030df15fd39883162b40e859542131a2f7784983b3e15d64d61c6c10"}, &(0x7f0000000100)=0x61) 20:34:19 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x5) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in=@initdev, @in6=@remote}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000100)=0xe8) write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) 20:34:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x1, @loopback, 0x80000000000007}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) getgid() sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x8, &(0x7f0000000140)=0x8, 0x4) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r1, &(0x7f00000000c0), 0x182, 0x0) 20:34:19 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00'}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:34:19 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e23, 0x478, @empty, 0x2ae}, {0xa, 0x4e21, 0x739c, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, 0x0, [0x6, 0x10000, 0xfff, 0x4, 0x55, 0x6, 0x7fffffff, 0x4]}, 0x5c) rmdir(&(0x7f0000000580)='./file0\x00') 20:34:19 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xbdb2, 0x0) r1 = getpgrp(0xffffffffffffffff) sched_setparam(r1, &(0x7f0000000040)=0xff) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$VT_ACTIVATE(r2, 0x5606, 0x6d) 20:34:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)=0x0) ptrace$getsig(0x4202, r1, 0x8, &(0x7f00000002c0)) 20:34:19 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 20:34:19 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0x1d19, 0x0) 20:34:19 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000340)={0x0, 0x2, 0x0, 0x8}) fstat(0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000380)='./bus\x00', 0x14103e, 0x0) fallocate(r2, 0x8, 0x0, 0x10000) 20:34:19 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="09001f2c223c00e7ff"], 0x9) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f00000003c0)=0xe8) fcntl$setflags(r1, 0x2, 0x1) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000005200000028bd7000fcdbdf251c08000600cd0f00000824447c8777553629c94f53a4000100e1fd6113b17952e08a5070cb7e3ec7c95ca8971d00310d0d1a2461805fb5e740987d4098aa84282914ea01403facc1d291d7735eec9657edcec020a0fd9160fd4abeccc7adeaed299fa3aec584c53ccff7806811955dff2505558de5b314a6e1d39b79248e21819bcb1ed94a9bb7f870a0a2dc42a33e978ec4fe8268d9e06f03", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00'], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) 20:34:19 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000300)=ANY=[]) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xa59, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000180)={0x0, 0x5}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x10b, 0x9, 0x1, 0x21e, 0x358, 0x100, 0x209, 0x8000}, "1a654bc87c2cc5cc433cb19462c432275ed8da92113f4634a0dc734753d2a37afb1f55c02b965686186b7c8d4ca0285cc8b10a092b6ed60f3f236a1a413b6e0f43df246f8626cfcea6fba800c8cb897d36dfbcbaa09d83530d"}, 0x79) fallocate(r2, 0x0, 0x0, 0x4003ff) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4006, 0x4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x4000801) sendfile(r3, r3, 0x0, 0x8800000) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 20:34:20 executing program 5: r0 = creat(0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000000)=""/32) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, 0x0, 0x0) signalfd4(r1, &(0x7f0000000280)={0x80}, 0x8, 0x0) mknod$loop(&(0x7f0000000240)='./bus\x00', 0x40, 0x1) socket$netlink(0x10, 0x3, 0x9) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r0, 0x2008003) readahead(r0, 0x0, 0x6) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f00000000c0)={'batadv0\x00', 0x4}) sendfile(r1, r2, 0x0, 0x8000fffffffe) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000180)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) 20:34:20 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x2000, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000040)) ioctl(r0, 0xb702, 0x0) 20:34:20 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(0x0, 0xfffffffffffffe1d, 0x6) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0xfffffeb0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 20:34:25 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00'}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:34:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@ng={0x4, 0x14, "b0604c6e6ca934d4"}, 0xa, 0x1) connect$inet6(r1, 0x0, 0x0) 20:34:25 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x58, r2, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6363}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x8080}, 0x800) 20:34:25 executing program 2: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000300)=ANY=[]) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xa59, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000180)={0x0, 0x5}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x10b, 0x9, 0x1, 0x21e, 0x358, 0x100, 0x209, 0x8000}, "1a654bc87c2cc5cc433cb19462c432275ed8da92113f4634a0dc734753d2a37afb1f55c02b965686186b7c8d4ca0285cc8b10a092b6ed60f3f236a1a413b6e0f43df246f8626cfcea6fba800c8cb897d36dfbcbaa09d83530d"}, 0x79) fallocate(r2, 0x0, 0x0, 0x4003ff) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4006, 0x4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x4000801) sendfile(r3, r3, 0x0, 0x8800000) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 20:34:25 executing program 5: openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0x5, r0, 0xa) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) lsetxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000001900)={'U-', 0x2}, 0x28, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x5, 0x7, 0x401, 0x3, 0xfe}) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000340)={0x38}) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000380)=@get={0x1, &(0x7f0000000280)=""/162, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0x2, 0x3, 0x1ff, 0xfffffffffffffbff}, 0x20) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000200)=@buf={0x2b, &(0x7f0000000140)="5857111f4260fd4e2e4d260a47b195b032d007ba9101bc4ae50d16e70d42dc43860a9bde1b2bf987e7fea6"}) arch_prctl$ARCH_SET_GS(0x1001, 0xffff) write$selinux_access(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000040)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1b) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 20:34:25 executing program 0: mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) poll(0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000001240)='TRUE', 0x4, 0x0) r0 = dup(0xffffffffffffffff) open(&(0x7f0000000080)='./file0/file0\x00', 0x8800, 0x183) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000140)) rmdir(&(0x7f0000000580)='./file0\x00') [ 2259.595572] kauditd_printk_skb: 71 callbacks suppressed [ 2259.595581] audit: type=1400 audit(1549744465.500:9893): avc: denied { create } for pid=11592 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2259.652810] audit: type=1400 audit(1549744465.540:9894): avc: denied { write } for pid=11592 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:34:25 executing program 3: r0 = getpid() r1 = syz_open_procfs$namespace(r0, &(0x7f0000000440)='ns/user\x00') ioctl(r1, 0xb702, 0x0) fsync(r1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000400)={0x2020000, 0x2791, 0x7fffffff, 0x7a2, 0x7}, 0x14) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x0, 0x0) r5 = getpgid(0x0) syz_open_procfs$namespace(r5, &(0x7f0000000200)='ns/mnt\x00') bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1f, 0x7, 0x3, 0x8, 0x8, r4, 0x2}, 0x2c) getsockopt$inet6_udp_int(r4, 0x11, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x4) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000140)='proc)vboxnet0\x00', 0xfffffffffffffff9) r7 = add_key(&(0x7f0000000100)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)="c8201fd210c7c20c31a582034df7e90e06a4a9a3f32d684df0d194b9e46f3d2a68e28ce418150ed24e73b028792ba633197525568a995f472b4a6ed77fe966ef305d1f353bcdeac55c810bd96782ead1ba562f011b211a628ec615aa07284241a0312f0b9cec2576f65988", 0x6b, r6) keyctl$link(0x8, r6, r7) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000540)={0x20}, 0xffad) add_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)="1ba3c42d999c015a0fe3880021cd1e083cd4e4eeef7ac7b17b14247efa8a72234a009dbd1219917eb5c7e12474a474a79a9352e0a2e3c3f9cdc55dda6518efd98c1e1c689ddce1684112f5956756f97e934ac5f198629684e77aba2f67516f46279af8554dec7ddb935dc148fd25207f2447e16d556d804e5fad33520c7ff63fd8d5ae16bbaa8dc96afd96f5bd439758ba78133989cfd9756e8791a570b00fa13c2ab9b8e9befe95ee8e4e553040f4a9e3fae658e5c47bc40a0f84c7dea4b48bd4ad22755fd62a4b5bef24f5bb34cc102b0cdc", 0xd3, r6) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000600)={0x8}, 0x4) socket$inet(0x2, 0x0, 0xfffffffffffffffb) [ 2259.744179] audit: type=1400 audit(1549744465.540:9895): avc: denied { map } for pid=11602 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2259.806649] audit: type=1400 audit(1549744465.560:9896): avc: denied { map } for pid=11606 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2259.831729] audit: type=1400 audit(1549744465.590:9897): avc: denied { read } for pid=11592 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:34:25 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000100)='ns/net\x00') ioctl(r1, 0xb702, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) [ 2259.916552] audit: type=1400 audit(1549744465.590:9898): avc: denied { create } for pid=11601 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2260.006340] audit: type=1400 audit(1549744465.590:9899): avc: denied { write } for pid=11592 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:34:26 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000004c0)={0x5, 0x70, 0xd86, 0x1, 0x3f, 0x8, 0x0, 0x2, 0x0, 0x2, 0x6, 0x0, 0x9, 0x91, 0x7fffffff, 0x0, 0x5, 0x0, 0x10001, 0x88, 0x80000000, 0x0, 0x0, 0x5, 0xff, 0xfffffffffffffff7, 0x1, 0xffff, 0x101, 0xb66, 0x3, 0xffffffffd89b4999, 0x6, 0x80000000, 0x100000001, 0xd3b2, 0x4, 0x6, 0x0, 0xffffffffffffe9db, 0x5, @perf_config_ext={0x100, 0x3f}, 0x40, 0x1, 0x6, 0x0, 0x3, 0x0, 0x3}) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) fstat(r2, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in=@dev, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) r9 = getegid() lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() fstat(r2, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getegid() fstat(r3, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = getegid() getgroups(0x1, &(0x7f0000000e00)=[0xee00]) setxattr$system_posix_acl(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='system.posix_acl_access\x00', &(0x7f0000000e40)={{}, {0x1, 0x3}, [{0x2, 0x6, r4}, {0x2, 0x7, r5}, {0x2, 0x1, r6}, {0x2, 0x4, r7}, {0x2, 0x7, r8}], {0x4, 0x5}, [{0x8, 0x1, r9}, {0x8, 0x5, r10}, {0x8, 0x2, r11}, {0x8, 0x0, r12}, {0x8, 0x1, r13}, {0x8, 0x0, r14}, {0x8, 0x5, r15}, {0x8, 0x4, r16}, {0x8, 0x4, r17}, {0x8, 0x5, r18}], {0x10, 0x1}}, 0x9c, 0x3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@known='system.posix_acl_default\x00', &(0x7f0000000440)='ns/uts\x00', 0x7, 0x3) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@rand_addr=0x6, @in6=@mcast1, 0x4e22, 0xfffffffffffffff8, 0x4e20, 0x8, 0xa, 0xa0, 0x80, 0x89, r19, r20}, {0x80000000, 0xd3, 0x8001, 0x4, 0x400, 0x0, 0x7fff, 0x6ea3}, {0x100, 0x6, 0x80000000, 0x360}, 0x3, 0x6e6bbd, 0x1, 0x1, 0x2, 0x2}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d4, 0xff}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3507, 0x0, 0x3, 0x7f, 0x4, 0x40, 0x100000000}}, 0xe8) ioctl(r1, 0xb702, 0x0) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000780)=""/206) write$P9_RMKDIR(r2, &(0x7f00000000c0)={0x14, 0x49, 0x1, {0x1, 0x2, 0x3}}, 0x14) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000580)) [ 2260.039833] audit: type=1400 audit(1549744465.590:9900): avc: denied { map } for pid=11612 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2260.062734] audit: type=1400 audit(1549744465.610:9901): avc: denied { read } for pid=11601 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2260.115734] audit: type=1400 audit(1549744465.680:9902): avc: denied { map } for pid=11615 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:26 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockname$packet(0xffffffffffffff9c, &(0x7f00000060c0)={0x11, 0x0, 0x0}, &(0x7f0000006100)=0x14) fstat(r0, &(0x7f0000006140)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000061c0)={{{@in=@local, @in=@multicast1, 0x4e24, 0x100000001, 0x4e21, 0x1, 0xa, 0x80, 0x80, 0xad, r2, r3}, {0x6, 0x7, 0xfffffffffffff000, 0x20, 0xfffffffffffffffa, 0x4, 0xff, 0xfb24}, {0x6, 0x1, 0xff, 0x1000}, 0x0, 0x6e6bb8, 0x1, 0x1, 0x1, 0x1}, {{@in6=@mcast2, 0x4d4, 0x33}, 0x2, @in6=@ipv4={[], [], @multicast2}, 0x3500, 0x0, 0x3, 0x0, 0x2, 0x5, 0x3}}, 0xe8) 20:34:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd76}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="78354a0204000a0e0000000300000000000000053f1000000000000a00000000000004000000000000000000009d2100000000000100000000000002000100010000000000000200fd00000576502ab28f6a4547000400000000000a002a3dbbb6896209000000000000009aec3f3f777593000000ff17004000009a22ffcdb29b95021836a2c2af2dc421cb757177c04a51b644765089803a6b92960601c6d35dae6cccd206a9ae5ad2f2b42ae3731d30c9b7ed5ef198b112d007cc07e3316e98a9d0e9dc1c035a6cbf5fe4030276385e4f224307"], 0x70}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40002ee, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x58400, 0x80) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000080)={0x56, 0x904, 0x1, {0x5, 0x4cb}, {0x2, 0xff}, @cond=[{0x9, 0x21c, 0x7, 0x1000, 0x0, 0x10d1}, {0xb0e, 0xda, 0x9, 0x5, 0x1, 0xfff}]}) 20:34:26 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') ioctl(r0, 0xb702, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltfilter={0x2c, 0x2d, 0x309, 0x0, 0x0, {}, [@TCA_RATE={0x8}]}, 0x2c}}, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'ip6tnl0\x00', 0x7fffffff}) [ 2260.534272] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=28265 sclass=netlink_route_socket pig=11645 comm=syz-executor.3 20:34:32 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r1, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) 20:34:32 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @initdev}, &(0x7f0000000700)=0x10, 0x80000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000800)={0x0}, &(0x7f00000000c0)=0xfffffffffffffef1) sched_setaffinity(r1, 0x8, &(0x7f0000000400)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpgrp(r1) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080526, r3}, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) fsync(r2) ioctl$ASHMEM_SET_PROT_MASK(r6, 0x40087705, &(0x7f0000000280)={0x6}) ptrace$setregset(0x4205, r3, 0x201, &(0x7f0000000240)={&(0x7f0000000740)="eee831c4c55ec237f036e607532e6be515e0ff59eb07ca967784d01655a33a563c297579808c05c2a32773aa52580871a379712644cd3fe309a095938a2699f285daf00f0c5072970a04d508e74dce8d091b9a0d946312e9543ffaf5c41d7507c95443fb0c4d26a2411c4684267a142a2db6dc35d80807e4b29643daa044b555ae0533296509e0fda89f", 0x8a}) ioctl$EVIOCGMTSLOTS(r4, 0x8040450a, 0x0) ioctl$int_in(r5, 0x5473, &(0x7f0000000580)=0xe2e) fcntl$lock(r2, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ptrace$setregset(0x4205, r1, 0x4, 0x0) io_setup(0x8, &(0x7f00000002c0)=0x0) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000b40)=""/200, &(0x7f0000000340)=0xc8) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x4bc, 0xc141, 0x81, 0x7, 0x0, 0x80000000, 0x1000, 0x4, 0x7, 0x400, 0x3e, 0x4, 0x650946, 0xfffffffffffffff9, 0x1, 0xd33, 0x6, 0x3, 0x8, 0x201, 0xe9, 0x3, 0x7, 0xffffffffffffffff, 0x10000, 0xc000, 0x7, 0x8000, 0xfffffffffffffffd, 0x6, 0xba39, 0x5b, 0x7, 0xd, 0x400, 0x5, 0x0, 0x2, 0x0, @perf_config_ext={0xfffffffffffffe01, 0x8}, 0x100, 0x6, 0x6, 0xf, 0x2, 0xa, 0x368}, r3, 0x3, r4, 0x1) io_cancel(r7, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x423, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r6, r8, &(0x7f0000000200)=0x3, 0x9) 20:34:32 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="080007000000000040000100240001006c625f68616a785f737461747300000000000000000000000000000000000000080003000b00000008000400880600000800070000000000e4080013d6294e9f20a8e4a5fc3905a8e0f3a27c844f337a28328687ed809590422b35f676769e83271f054b56cef851b5c717fd668ac7a7433aadfb85788c64067fdb94dc570173a35f89e5078b4518334c88fccd36ae0f7d285f649db6802b0751d8781fcb58316a270e003f682083eaedbd685c0850b885cb2e105e8446f209f66569c9033f552e75a5fa27a150e50de7805a19de60ebbc4c5774afcd02e5a34862775965f6f4062622d32e801e6238e87a7087a801000000000000007fb279d4563da0533abf489d3c23cf9ad5f033d3e1e96b80f9f306efaa94e62107c26747531f34dd93fe1608b69ca25c744bbd7df31f5c7dfbb97163fda5d861bd81bb11399f66fb12a2da387a03f8dd33bee7cba7f724b16a5bcc48af8c23922cc1f5980a28dbe0297d0fe1fca55c6f70ed7fe074834596dbf62d19d7c903fa8fbb0969184af2542110293b580e756ec016a413d34d22d9dd36e5ec9fa29a2d8b34125bd435d5b762d963dd8a9f2136f2f937184b5229d72ba13655e29dc86391cc1489d2f176f80c7b8773824202e3e54c925cde75d638700ad40980e4b586c94fd1a354748241269d023ee23759b0b2dbf4e342200eb2bfab878ddebaf137a400979fac78e1d1443b806800000000b8bf7ccaacb724b1b2ddd74e6c75516efe74e189fef59fb06e900d721fded45458ef0e0aaa1814a2858bb36c4832a7520792ee4bca334528baf9003700000000000000f67f0276a139d423d5464bfa47fe0932bce55f6408dfaf5c295c50819549ff363a4b649bb8d55d8fe41ae9576caf7a32f14583eba73d3b9019bbd6cb1b4f5647cff6be2a2900000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:34:32 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x4) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)=0x0) setpgid(0x0, r2) ftruncate(r1, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) getpid() r4 = getpgid(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r3, 0x0) r5 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tee(r0, r5, 0xb0, 0x800008) r6 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x19, &(0x7f000074fffc)=0x3, 0x348) r7 = dup(r6) setsockopt$inet6_tcp_int(r7, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) setsockopt$inet6_int(r6, 0x29, 0x35, &(0x7f00000000c0)=0x6, 0x4) setns(r7, 0x1ffffffb) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./bus\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$int_in(r6, 0x4, &(0x7f0000000240)) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f00000002c0)=""/165) syz_open_procfs$namespace(r4, &(0x7f0000000100)='ns/ipc\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_genetlink_get_family_id$nbd(0x0) r8 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) 20:34:32 executing program 5: r0 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f000004bfe4)={0xa, 0x0, 0x0, @mcast2, 0xfff}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) 20:34:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in6, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') ioctl(r1, 0xb702, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000200)=""/197) 20:34:32 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0xa0400, 0x0) ioctl(r0, 0x13, &(0x7f00000000c0)="9d75377abfa75267da4c5cb23f559e299e48dd1913b2f4c7f616a67a61f9333be45ad28bcc767aec2a6795d9249f0388074a6911b042ad68a05186a4eff4613abac8291abcb46f8d86ab6cf0f0fcdcd1e0d22e2393e53003509a6cd91fc229f900f738f0c0c1291adf5d55597178f45f027c6ea5a8c6a16f3cbc0f284039427bd7c7d37ed7e4a06b098bc1e33c6f1811333b60e023e176d7722a84b7f8dc622efc8142c6a0c644d44b19b942e287caf9dd62e139353a873adc734899eede461aa106e6b603b0da") r1 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0x100000073) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) [ 2266.679560] kauditd_printk_skb: 19 callbacks suppressed [ 2266.679569] audit: type=1400 audit(1549744472.580:9922): avc: denied { map } for pid=11663 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:32 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_mreqsrc(r2, 0x0, 0x2d, &(0x7f0000000040)={@dev, @initdev, @initdev}, &(0x7f00000000c0)=0xc) [ 2266.785107] audit: type=1400 audit(1549744472.620:9923): avc: denied { create } for pid=11655 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=tcp_socket permissive=1 [ 2266.829096] audit: type=1400 audit(1549744472.630:9924): avc: denied { map } for pid=11669 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2266.890903] audit: type=1400 audit(1549744472.650:9925): avc: denied { map } for pid=11663 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2266.915912] audit: type=1400 audit(1549744472.650:9926): avc: denied { map } for pid=11663 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2266.951121] audit: type=1400 audit(1549744472.650:9927): avc: denied { map } for pid=11663 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2266.975813] audit: type=1400 audit(1549744472.670:9928): avc: denied { create } for pid=11662 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2267.004235] audit: type=1400 audit(1549744472.670:9929): avc: denied { write } for pid=11662 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2267.029576] audit: type=1400 audit(1549744472.680:9930): avc: denied { map } for pid=11675 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:33 executing program 3: r0 = geteuid() ioprio_get$uid(0x3, r0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r1, 0xb702, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_proto_private(r2, 0x89e5, &(0x7f0000000040)="83513aa2c97282368fc94acfe9b4fd934d56e9bc9f927a56867ee1e6a4d82583edfa94b94e92bba81780c2701493c0318e3f69ad644a00590f01b2f58c96339d124be1b69498bd5726d4690fa7d227e92c9e78a82d9e725178adbd55e2373a12cc7258430e98517c8f048874e2cdced880b521a46ca711de3fbc2691490a5d7ca6849fbc5bb2a20bf0d59245") [ 2267.052329] audit: type=1400 audit(1549744472.680:9931): avc: denied { map } for pid=11675 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:33 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @initdev}, &(0x7f0000000700)=0x10, 0x80000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000800)={0x0}, &(0x7f00000000c0)=0xfffffffffffffef1) sched_setaffinity(r1, 0x8, &(0x7f0000000400)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpgrp(r1) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080526, r3}, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) fsync(r2) ioctl$ASHMEM_SET_PROT_MASK(r6, 0x40087705, &(0x7f0000000280)={0x6}) ptrace$setregset(0x4205, r3, 0x201, &(0x7f0000000240)={&(0x7f0000000740)="eee831c4c55ec237f036e607532e6be515e0ff59eb07ca967784d01655a33a563c297579808c05c2a32773aa52580871a379712644cd3fe309a095938a2699f285daf00f0c5072970a04d508e74dce8d091b9a0d946312e9543ffaf5c41d7507c95443fb0c4d26a2411c4684267a142a2db6dc35d80807e4b29643daa044b555ae0533296509e0fda89f", 0x8a}) ioctl$EVIOCGMTSLOTS(r4, 0x8040450a, 0x0) ioctl$int_in(r5, 0x5473, &(0x7f0000000580)=0xe2e) fcntl$lock(r2, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ptrace$setregset(0x4205, r1, 0x4, 0x0) io_setup(0x8, &(0x7f00000002c0)=0x0) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000b40)=""/200, &(0x7f0000000340)=0xc8) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x4bc, 0xc141, 0x81, 0x7, 0x0, 0x80000000, 0x1000, 0x4, 0x7, 0x400, 0x3e, 0x4, 0x650946, 0xfffffffffffffff9, 0x1, 0xd33, 0x6, 0x3, 0x8, 0x201, 0xe9, 0x3, 0x7, 0xffffffffffffffff, 0x10000, 0xc000, 0x7, 0x8000, 0xfffffffffffffffd, 0x6, 0xba39, 0x5b, 0x7, 0xd, 0x400, 0x5, 0x0, 0x2, 0x0, @perf_config_ext={0xfffffffffffffe01, 0x8}, 0x100, 0x6, 0x6, 0xf, 0x2, 0xa, 0x368}, r3, 0x3, r4, 0x1) io_cancel(r7, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x423, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r6, r8, &(0x7f0000000200)=0x3, 0x9) 20:34:33 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20000, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0xc0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) getgroups(0xa, &(0x7f00000000c0)=[0x0, 0x0, 0xffffffffffffffff, 0xee01, 0x0, 0x0, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) setfsgid(r5) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffc, 0x5}}, 0xe8) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4, 0xf88f, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r4, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r3, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="02070009020000000000000000210000331e8fbb80f2bb62be99b270665e773186ba1bea2a6196b2f1069e2c874620dbff3522e864a6b943337c2a850113d2558403ce3de8eb30f0ed13e0ffd384169ef32e3bbfc0169fdf455e3042db5559883344cd5f2e155f33c1391aeb9679d827f8b70314c9678ba48599ba7a76b9232aa40ecc27b0b2a7a9f6b7fe37bd610f07f8f356032d949c9bd0f823b0262cc6c71a0d66"], 0x10}}, 0x0) connect$netlink(r1, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x2000000}, 0xc) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000180)=""/108) 20:34:33 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000640)={0x2, 0x0, @initdev}, &(0x7f0000000700)=0x10, 0x80000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000800)={0x0}, &(0x7f00000000c0)=0xfffffffffffffef1) sched_setaffinity(r1, 0x8, &(0x7f0000000400)=0x8000009) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpgrp(r1) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080526, r3}, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) fsync(r2) ioctl$ASHMEM_SET_PROT_MASK(r6, 0x40087705, &(0x7f0000000280)={0x6}) ptrace$setregset(0x4205, r3, 0x201, &(0x7f0000000240)={&(0x7f0000000740)="eee831c4c55ec237f036e607532e6be515e0ff59eb07ca967784d01655a33a563c297579808c05c2a32773aa52580871a379712644cd3fe309a095938a2699f285daf00f0c5072970a04d508e74dce8d091b9a0d946312e9543ffaf5c41d7507c95443fb0c4d26a2411c4684267a142a2db6dc35d80807e4b29643daa044b555ae0533296509e0fda89f", 0x8a}) ioctl$EVIOCGMTSLOTS(r4, 0x8040450a, 0x0) ioctl$int_in(r5, 0x5473, &(0x7f0000000580)=0xe2e) fcntl$lock(r2, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ptrace$setregset(0x4205, r1, 0x4, 0x0) io_setup(0x8, &(0x7f00000002c0)=0x0) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000b40)=""/200, &(0x7f0000000340)=0xc8) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x4bc, 0xc141, 0x81, 0x7, 0x0, 0x80000000, 0x1000, 0x4, 0x7, 0x400, 0x3e, 0x4, 0x650946, 0xfffffffffffffff9, 0x1, 0xd33, 0x6, 0x3, 0x8, 0x201, 0xe9, 0x3, 0x7, 0xffffffffffffffff, 0x10000, 0xc000, 0x7, 0x8000, 0xfffffffffffffffd, 0x6, 0xba39, 0x5b, 0x7, 0xd, 0x400, 0x5, 0x0, 0x2, 0x0, @perf_config_ext={0xfffffffffffffe01, 0x8}, 0x100, 0x6, 0x6, 0xf, 0x2, 0xa, 0x368}, r3, 0x3, r4, 0x1) io_cancel(r7, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x423, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r8 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) sendfile(r6, r8, &(0x7f0000000200)=0x3, 0x9) 20:34:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='sys\xc1\xfbwg\xa4\x91]v\xf8tem_u:object_r:semanage_trans_l', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) 20:34:33 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x400000000000, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat\x00') openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) read$eventfd(0xffffffffffffffff, 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b94", 0x50, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) link(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) keyctl$unlink(0x9, r2, 0xfffffffffffffffd) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x8000) r4 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000740)) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_CONNECT(r4, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="000429bd7000fedbdf25010000000c00e4ff0100000000"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x4) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x9) 20:34:39 executing program 2: clone(0x41f8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x11, 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r1, 0x10, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000010) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(r2, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f00000000c0)) ptrace(0x10, r3) 20:34:39 executing program 5: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000800)={0x0, 0x0}) perf_event_open(&(0x7f0000000a00)={0x3, 0x70, 0x4, 0x3ff, 0x5, 0x7, 0x0, 0x2e, 0x2, 0x8, 0x5, 0x1, 0x8, 0x2, 0x67c2, 0x6, 0x2, 0x80000000, 0x3856, 0x6, 0x8, 0x7fff, 0x4, 0xa28f, 0x2, 0x4fc6, 0x2, 0x10000, 0x81, 0x8, 0x9, 0x3, 0x35, 0x3, 0x5, 0x6, 0x2, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x7, 0x7}, 0x8, 0xef, 0x0, 0xb, 0x4, 0x1, 0x5d}, r1, 0x8, r0, 0x2) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x800000000000}) r3 = syz_open_pts(r2, 0x0) write$binfmt_aout(r2, &(0x7f0000000240)=ANY=[], 0x35b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = accept4(0xffffffffffffff9c, &(0x7f0000000200)=@hci, &(0x7f0000000080)=0x80, 0x800) setsockopt$inet6_group_source_req(r4, 0x29, 0x2f, &(0x7f0000000280)={0x4, {{0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}, {{0xa, 0x4e20, 0x10000, @empty, 0x5}}}, 0x108) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/1}, 0x18) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f0, &(0x7f0000000140)='sit0\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth1\x00', 0x43732e5398417f1a}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f00000003c0)=0x1e) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_DEL_MFC(r6, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e23, 0x4, @empty, 0x1000}, {0xa, 0x0, 0x6, @dev={0xfe, 0x80, [], 0x13}, 0x8000}, 0x6, [0x9, 0x1, 0x7a, 0x1a, 0x8, 0xfffffffffffffff8, 0x0, 0x101]}, 0x5c) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000140)='sit0\x00') ioctl$sock_inet_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000400)) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)={0x17}) socket$nl_route(0x10, 0x3, 0x0) r7 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r7, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000080}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x4800) syz_open_procfs(0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:34:39 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) syz_open_procfs(0x0, &(0x7f0000000c40)='net/dev_snmp6\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000003c0)=0x0) sched_setaffinity(r1, 0xbd, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x4000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x1, 0x11, r6, 0x0) write$P9_RSTATu(r5, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000040)={0x9, 0x6, 0x6, 0x200, 0x8}) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0xfffffc1d}]) rt_sigprocmask(0x0, &(0x7f0000000680), &(0x7f0000000280), 0x8) unshare(0x40000000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) rt_sigprocmask(0x3, &(0x7f0000000000), 0x0, 0x8) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) creat(&(0x7f0000000580)='./file1\x00', 0x0) 20:34:39 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r0, 0xb702, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setns(r0, 0x10000000) pread64(r0, &(0x7f0000000000)=""/81, 0x51, 0x0) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x160, r2, 0x525, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x6c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x40}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x71253430}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x500}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'lapb0\x00'}}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x6a0080, 0x0) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f00000000c0)) 20:34:39 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000000)=0x3f) connect$inet6(r1, 0x0, 0x0) 20:34:39 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="080007000000000040000100240001006c625f68616a785f737461747300000000000000000000000000000000000000080003000b00000008000400880600000800070000000000e4080013d6294e9f20a8e4a5fc3905a8e0f3a27c844f337a28328687ed809590422b35f676769e83271f054b56cef851b5c717fd668ac7a7433aadfb85788c64067fdb94dc570173a35f89e5078b4518334c88fccd36ae0f7d285f649db6802b0751d8781fcb58316a270e003f682083eaedbd685c0850b885cb2e105e8446f209f66569c9033f552e75a5fa27a150e50de7805a19de60ebbc4c5774afcd02e5a34862775965f6f4062622d32e801e6238e87a7087a801000000000000007fb279d4563da0533abf489d3c23cf9ad5f033d3e1e96b80f9f306efaa94e62107c26747531f34dd93fe1608b69ca25c744bbd7df31f5c7dfbb97163fda5d861bd81bb11399f66fb12a2da387a03f8dd33bee7cba7f724b16a5bcc48af8c23922cc1f5980a28dbe0297d0fe1fca55c6f70ed7fe074834596dbf62d19d7c903fa8fbb0969184af2542110293b580e756ec016a413d34d22d9dd36e5ec9fa29a2d8b34125bd435d5b762d963dd8a9f2136f2f937184b5229d72ba13655e29dc86391cc1489d2f176f80c7b8773824202e3e54c925cde75d638700ad40980e4b586c94fd1a354748241269d023ee23759b0b2dbf4e342200eb2bfab878ddebaf137a400979fac78e1d1443b806800000000b8bf7ccaacb724b1b2ddd74e6c75516efe74e189fef59fb06e900d721fded45458ef0e0aaa1814a2858bb36c4832a7520792ee4bca334528baf9003700000000000000f67f0276a139d423d5464bfa47fe0932bce55f6408dfaf5c295c50819549ff363a4b649bb8d55d8fe41ae9576caf7a32f14583eba73d3b9019bbd6cb1b4f5647cff6be2a2900000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) [ 2273.860897] kauditd_printk_skb: 75 callbacks suppressed [ 2273.860908] audit: type=1400 audit(1549744479.770:10007): avc: denied { create } for pid=11815 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2273.910697] audit: type=1400 audit(1549744479.800:10008): avc: denied { write } for pid=11815 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:34:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c748) r0 = open(0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) timerfd_settime(r0, 0x1, &(0x7f0000000480)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f00000004c0)) request_key(&(0x7f0000000300)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='*\x00', r1) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') write$P9_RWRITE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r2, r3, 0x80000) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r5, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) preadv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) fcntl$getown(r5, 0x9) syz_open_procfs(0x0, &(0x7f0000000280)='mounts\x00') delete_module(&(0x7f00000002c0)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0xa00) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x2021, 0x1) [ 2273.960943] audit: type=1400 audit(1549744479.800:10009): avc: denied { map } for pid=11818 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:39 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)) ioctl(r0, 0xb702, 0x0) [ 2274.030169] audit: type=1400 audit(1549744479.810:10010): avc: denied { create } for pid=11810 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2274.148337] audit: type=1400 audit(1549744479.810:10011): avc: denied { write } for pid=11810 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:34:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040, 0x0, 0x0, 0xfffffffffffffffe}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) unshare(0x4020c00) 20:34:40 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl(r0, 0xb702, 0x0) [ 2274.280272] audit: type=1400 audit(1549744479.820:10012): avc: denied { map } for pid=11816 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:40 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000100)='ns/uts\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000000)='sessionid\x00') getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000080)=0x10) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000140)=0x5ac) ioctl(r1, 0x401, 0x0) ioctl$void(r2, 0xc0045c79) [ 2274.375094] audit: type=1400 audit(1549744479.850:10013): avc: denied { read } for pid=11815 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2274.453171] audit: type=1400 audit(1549744479.850:10014): avc: denied { create } for pid=11808 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:34:40 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x3, 0x1ff, 0x6, 0x1ff, 0x0, 0x1493e61b, 0x797c134c62da40bd, 0x2, 0x7, 0x296, 0xf0df, 0x6, 0x5, 0x29, 0xfffffffffffffff9, 0x9, 0x7fff, 0xffffffff, 0x53e, 0x2752, 0xffffffffffffff80, 0x6, 0x5, 0x9, 0x9, 0x7fff, 0x2d8, 0x3ff, 0x5746, 0x0, 0xb5, 0x7, 0xffffffff9bd812cb, 0x7, 0x3ffc00, 0x7, 0x0, 0x8000, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x8, 0x401, 0x1, 0x7, 0x71d0, 0x5, 0x100000000}, 0x0, 0x9, 0xffffffffffffffff, 0x1) flistxattr(r0, &(0x7f00000000c0)=""/42, 0x2a) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xe8) setreuid(r1, r2) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') ioctl(r3, 0xb702, 0x0) [ 2274.515728] audit: type=1400 audit(1549744479.850:10015): avc: denied { write } for pid=11808 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2274.590013] audit: type=1400 audit(1549744479.850:10016): avc: denied { map } for pid=11820 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:40 executing program 2: accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000500)) r0 = openat$selinux_validatetrans(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r2 = openat(r1, &(0x7f0000000100)='./file0\x00', 0x400402, 0xb0) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0xedc}, 0x28) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000300), &(0x7f0000000340)=0x4) 20:34:40 executing program 3: r0 = add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="b354f9575f7e83e132fec0ac00c8ba6c4dd69527da9e158933d52e8832b39d7c1d6f24e28bc041a061cac0fd9e4986a59b82e063fb6d2148b15aa98db5de9049ac8ecf9e35e79a86b62903aac7e48686711838cc5713812481b706eb5f", 0x5d, 0xfffffffffffffffb) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="5e93ed66aa84d4c6e9b779dcc6ef3213b0c0284277c57ab274d0d841f6c318d0085129992ae2b6e0a92176262785913ed769bc364fe808b2ef101de99b1f643f1d2cad899034d8f1a030ca9c578437cd4e5e982957ff763a19f98daa323fa4f004e6caeafdd59aa18000c70fde96fc896a53138e6785542aae6e97ba3d2a864c43f248b4984614b55e2ea6144105fee3a1fe847284e5755bb808be788e1eb0f4f2ef453c2a64ef150c4cf79407c91a9584fc688c41fa1290a0d08d39ba2de2e01bb920ff8c9df266", 0xc8, r0) r1 = memfd_create(&(0x7f0000000080)='securityselfsecurity\x00', 0xfffffffffffffffc) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000000)) 20:34:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) syz_open_procfs(0x0, &(0x7f0000000c40)='net/dev_snmp6\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000003c0)=0x0) sched_setaffinity(r1, 0xbd, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x4000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x1, 0x11, r6, 0x0) write$P9_RSTATu(r5, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000040)={0x9, 0x6, 0x6, 0x200, 0x8}) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0xfffffc1d}]) rt_sigprocmask(0x0, &(0x7f0000000680), &(0x7f0000000280), 0x8) unshare(0x40000000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) rt_sigprocmask(0x3, &(0x7f0000000000), 0x0, 0x8) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) creat(&(0x7f0000000580)='./file1\x00', 0x0) 20:34:41 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x1}) 20:34:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pause() ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x100000002, 0x4) getsockopt$inet_mreqsrc(r0, 0x0, 0x2e, &(0x7f0000000080)={@multicast2, @broadcast, @initdev}, &(0x7f00000000c0)=0xc) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 20:34:44 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="02042dbd7000fc000c000200080002004e200015080004004d00000014000100080005000000000008000900770000003000030414000600005a45efe7060000000000000000ffffffffffff08000500ac1414bb0801080600000000080007004e2100005d000407fd844378fd536307379e023b0057cc8d237c282918bf40128fdd6d3b9ac482627a4173f3d26080b3c8b5214ac76597d9a4d5c5f058fbaf5db704622f62cc1af932e0528eb34a90a84ac1c603a85d273d347ff41a975e64c21ed24b7c3f1596b3a3b5cf68f308b7a38dd4b1daf82a3b87278b21c0492bed58e01e7d4783050000004ca3b4c5fae4639ab635054f469722e95dada1f361a949d0ee460e313674d470024bb54db260eda4974fb622698c2fc2596bdaa96040ca178df4d5757fb1257c3001000000000000002ca33d107e770f50c11f8938e560522aa795b7c84cf2de19d16e42046de61e3775326e9ab668ac894a6598cd1b85c9e18cef07fd016f12c89e37719a5b39777f18a1634fa8772cee025e11d36fda12a3359a014e784ef0a0ca7c41feb23ac0926b953c9a4f9a7f77e64e49b083559a2e4f7014d036968a351fb5f8c3abb2c2db422c041c5533518615a07413afe59cdf2d55da68"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:34:44 executing program 0: creat(&(0x7f0000000440)='./file0\x00', 0x44) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x18401}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44810}, 0x4000044) socket$key(0xf, 0x3, 0x2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x3c5) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000280)) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @rand_addr, @remote}, &(0x7f0000000140)=0xc) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBLED(r6, 0x4b64, 0x0) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/checkreqprot\x00', 0x4002, 0x0) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f0000000600)) socket(0x11, 0x80000, 0x9fa) readahead(r5, 0x3f, 0x7) syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') setfsuid(0x0) getpeername$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000640)=0xffffffffffffffe6) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x10000) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xaaaaaaaaaaaa8b8, &(0x7f0000000200), 0x0, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:34:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7ff) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="b7000000ffffffff2c0000000000000095000000000000009a959de792a1c47b8cc350cc38b51347518688f9911c816cac6764ba9c237256ce99702e50ac0f5eec393c3a96f20ec38383eda8ab9e88a6ce8a57742fc9553c43efcf9539c103b0d854465090b988f776e6020ded9015baab9f9a925f7c54bbfc1238fa4badb4f3787bd54f052a535a0e7fbdadb6ef908b00d5f4a4285cc7ed8cb8a1fc3acfe282fff23ae70d27312b82eaf823a14bd9b6ac86e655063e30c62d7c1c77d9"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) 20:34:44 executing program 5: eventfd2(0x22, 0x1) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x100, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000600)=""/229, 0xe5}, {&(0x7f0000000200)=""/56, 0x38}], 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='memory.events\x00', 0x0, 0x0) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000280)=r2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000340)={'gre0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="0f0000000000000001000000ff01000000000000000000001a0000003d02000009000000e5000000200000000000000000000000002a00080800000000000000000000000000005a83d8d82a7e59a700000000000000"]}) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='ne\xd3;0\xc6\x0ex\x02\ator\x00') sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000001c0)=@req={0x2, 0x9, 0x1ff}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000400), 0xfffffffffffffdbd) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x1000, 0x0) write$binfmt_script(r5, &(0x7f0000000980)=ANY=[@ANYBLOB="2321202e2f6275732065746831766d6e6574305e73797374656d7472757374656470726f633a2a6b65368d4890c48333ae65765c2c5c7365637572697479202c6264657647504c206e65d33b30c60e780207746f720020707070312e202f6465762f76756c6c00206e65d33b30c60e780207746f7200206d656d0300792e6576656e747300200a7ce75194e0b97cc20466fcf621252ba325ecd048817b1a6b6f1ec754506bf0c00849b10ebca15b09ba57d34369f6961aadd55e9e44f6339a9f735c2133b0cf60001df6d13b7cf4be2ae375d51c6743c563dc69b8e5abffdea01a5625fb62fdef9245e35095a1c336a520b9aac45fd00c00b66cd89ce25135c67d7cda7573a56795be0b36901c9bb19766fe4d674188ffbdadb56adadfddc0aa4c08db98125b338c6b40a04f468aeafaa999d2a15ad2faca460679121ba9184ae38b93db6acd0f2dcaa848952f362f96c9cc18802d57e09e6f558f92b90f816494d04588abd60e2cedeb7f4ccde887072c52408560eb615d360048411ed143c8f3f9b93c462e6763249f88710fd8f56a0ac5bf7a3b62cc122eb576e385ac8c1356fdac7df3835cd6a5d8de9b25d8b5426f99dce6415580615656bc8ede89205f68e0bbda24ad18350525ca82be9f12691f3eae71ea67c0da6a131ea779aadea90a2247075dbb6079cb0c25ade31a8630755bcb81a3ab00252a11bb98e6d828291f7adc0ef5c4fe14b1cb3b"], 0x20b) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getuid() fstat(r4, &(0x7f0000000540)) perf_event_open(&(0x7f0000000140)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3f797656350e5994, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000240)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 20:34:44 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) ioctl(r0, 0x9b, &(0x7f0000000000)="bb166e334a675cdd92da27e3cb6b73bab848c99d8041b8a9c605a71f36c1b320bb13e5fd80c4b631b264212ae6f7f7ece62e6faedb2a35b9972161832b40fccb15") 20:34:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) syz_open_procfs(0x0, &(0x7f0000000c40)='net/dev_snmp6\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000003c0)=0x0) sched_setaffinity(r1, 0xbd, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x4000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x1, 0x11, r6, 0x0) write$P9_RSTATu(r5, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000040)={0x9, 0x6, 0x6, 0x200, 0x8}) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0xfffffc1d}]) rt_sigprocmask(0x0, &(0x7f0000000680), &(0x7f0000000280), 0x8) unshare(0x40000000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) rt_sigprocmask(0x3, &(0x7f0000000000), 0x0, 0x8) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) creat(&(0x7f0000000580)='./file1\x00', 0x0) [ 2278.941021] kauditd_printk_skb: 50 callbacks suppressed [ 2278.941030] audit: type=1400 audit(1549744484.840:10067): avc: denied { prog_load } for pid=11901 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:34:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r1, r3, 0x3, 0x0) dup2(r0, r1) close(r2) [ 2278.979574] audit: type=1400 audit(1549744484.850:10068): avc: denied { map } for pid=11908 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2279.038049] audit: type=1400 audit(1549744484.850:10069): avc: denied { map } for pid=11908 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2279.065192] audit: type=1400 audit(1549744484.880:10070): avc: denied { prog_run } for pid=11901 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2279.089060] audit: type=1400 audit(1549744484.880:10071): avc: denied { prog_load } for pid=11901 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2279.150824] audit: type=1400 audit(1549744484.910:10072): avc: denied { prog_run } for pid=11901 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2279.205938] audit: type=1400 audit(1549744484.940:10073): avc: denied { map } for pid=11904 comm="syz-executor.3" path="/root/syzkaller-testdir068483191/syzkaller.9GNuLQ/1774/bus" dev="sda1" ino=18022 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 20:34:45 executing program 2: r0 = socket(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) chown(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='caif0\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000080)={0x5, 0xf4f, 0xffff, 0x6, 0x8bc8}) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x20000fff}) [ 2279.270644] audit: type=1400 audit(1549744485.020:10074): avc: denied { create } for pid=11909 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2279.360008] audit: type=1400 audit(1549744485.030:10075): avc: denied { write } for pid=11909 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2279.401552] audit: type=1400 audit(1549744485.030:10077): avc: denied { map } for pid=11920 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:45 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, r3) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)) lseek(0xffffffffffffffff, 0x0, 0x0) 20:34:45 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') sendfile(r0, r3, 0x0, 0x800000bf) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000000)=""/150) 20:34:45 executing program 5: eventfd2(0x22, 0x1) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x100, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000600)=""/229, 0xe5}, {&(0x7f0000000200)=""/56, 0x38}], 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='memory.events\x00', 0x0, 0x0) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000280)=r2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000340)={'gre0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="0f0000000000000001000000ff01000000000000000000001a0000003d02000009000000e5000000200000000000000000000000002a00080800000000000000000000000000005a83d8d82a7e59a700000000000000"]}) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='ne\xd3;0\xc6\x0ex\x02\ator\x00') sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000001c0)=@req={0x2, 0x9, 0x1ff}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000400), 0xfffffffffffffdbd) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x1000, 0x0) write$binfmt_script(r5, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x20b) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getuid() fstat(r4, &(0x7f0000000540)) perf_event_open(&(0x7f0000000140)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3f797656350e5994, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000240)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 20:34:45 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000000)='system_u:object_r:semanage_trans_lock_t:s0\n', 0xfffffffffffffdc5) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) 20:34:46 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="080007000000000040000100240001006c625f68616a785f737461747300000000000000000000000000000000000000080003000b00000008000400880600000800070000000000e4080013d6294e9f20a8e4a5fc3905a8e0f3a27c844f337a28328687ed809590422b35f676769e83271f054b56cef851b5c717fd668ac7a7433aadfb85788c64067fdb94dc570173a35f89e5078b4518334c88fccd36ae0f7d285f649db6802b0751d8781fcb58316a270e003f682083eaedbd685c0850b885cb2e105e8446f209f66569c9033f552e75a5fa27a150e50de7805a19de60ebbc4c5774afcd02e5a34862775965f6f4062622d32e801e6238e87a7087a801000000000000007fb279d4563da0533abf489d3c23cf9ad5f033d3e1e96b80f9f306efaa94e62107c26747531f34dd93fe1608b69ca25c744bbd7df31f5c7dfbb97163fda5d861bd81bb11399f66fb12a2da387a03f8dd33bee7cba7f724b16a5bcc48af8c23922cc1f5980a28dbe0297d0fe1fca55c6f70ed7fe074834596dbf62d19d7c903fa8fbb0969184af2542110293b580e756ec016a413d34d22d9dd36e5ec9fa29a2d8b34125bd435d5b762d963dd8a9f2136f2f937184b5229d72ba13655e29dc86391cc1489d2f176f80c7b8773824202e3e54c925cde75d638700ad40980e4b586c94fd1a354748241269d023ee23759b0b2dbf4e342200eb2bfab878ddebaf137a400979fac78e1d1443b806800000000b8bf7ccaacb724b1b2ddd74e6c75516efe74e189fef59fb06e900d721fded45458ef0e0aaa1814a2858bb36c4832a7520792ee4bca334528baf9003700000000000000f67f0276a139d423d5464bfa47fe0932bce55f6408dfaf5c295c50819549ff363a4b649bb8d55d8fe41ae9576caf7a32f14583eba73d3b9019bbd6cb1b4f5647cff6be2a2900000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:34:46 executing program 3: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x420880, 0x0) r1 = timerfd_create(0x3, 0x80000) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000080)) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000040)) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 20:34:46 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) read(r0, &(0x7f0000000200)=""/217, 0xd9) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000600)=0x7, 0x4) syslog(0x3, &(0x7f0000000000)=""/172, 0xac) r3 = fcntl$dupfd(r0, 0x0, r1) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x800) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) close(r1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000100)={0x0, @speck128}) r6 = socket$netlink(0x10, 0x3, 0xa) r7 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x200004) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1f) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f00000001c0)='bridge_slave_1\x00') sendfile(r1, r7, 0x0, 0x8000fffffffe) socket$inet(0x2, 0x80000, 0x81) ioctl$sock_FIOSETOWN(r6, 0x8901, &(0x7f0000000140)=r5) dup3(r0, r2, 0x80000) ioctl$TIOCNOTTY(r3, 0x5422) 20:34:46 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f0000000180)=0x80) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f00000000c0)={0x6, 0x80}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') dup(r0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000080)=0x1) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000007180)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000007140)={&(0x7f0000007500)=ANY=[]}}, 0x4000010) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000340)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x100000000, 0x7, &(0x7f0000000880)=[{&(0x7f00000003c0)="f6841b3ea14054f53d5e008da73c9bf926a0f7dbde035bf7eaf51e607a9c21cbc206bc79da7d527cfe2fdae895910eb6a6a6254fa45ffc878c1cf1c0e281966acaa190e8be", 0x45, 0x80000001}, {&(0x7f0000000440)="ccccd765335f447cf4299dfe12db9d927cb5070d2c40b3017184ba4f7acbc5b2be96a53cc42e844ceefb3bca91ce6a71049a46cba461d8597911ea8e54d227dcdd0fa18093af77a4005536e810468090fedec88acfba6d86cd8986513793d3acb8c074ff00a587", 0x67, 0x5}, {&(0x7f0000000580)="110a9bb941f5d0402fbdac69c160d667ae9dd2c767998959d5a4656874cf28889e6c4222f6f61dceac150d7c4cab33507f4d5df815c110418bab8e0196d0c5755774e0ecad494135eeba949c9bfe93fb0d3c290afda97723cc22abed490ff839149ec19125ff338da080eb3cbc09db037dd9c6f412385296aada8a03a436f53fb26bbc3779db0cd9848aca97f84c619a42cec94c62ed2f8f5e5e28f6945ed63cfc1ea3", 0xa3}, {&(0x7f00000004c0)}, {&(0x7f0000000640)="a4925c212f7dc859749e18cb62b2e53b3724b71b214595fde4b566ad4f5e4d59d0a34b61e3081df73ee26ac4641437af6166a15abf4614f47f48d07582df40df96cd8a8ee61a45858f51431a1858befa5bbfef7ef0933f887ea6a55d999640983b68de00e4f3b2e5dc0b9caed274a43d25c9e8d2bf1d3ee946dd45b0edab82cf321e377faae6f018171f60990dac8ca43260eaaf83a4893d09ff2134d12c2860497d6a79df4fb2cbb87b1e4470269408e98d4b99b2f9246e07d7d9a39bf96b2b025c0e050c1f4e973c70", 0xca, 0xa57}, {&(0x7f0000000740)="ddc930378573388dddadb701c3f70d80372a2ee82ebd2ed874b8cbd1ec13bfd17d2cd0d0b253665594ec7d789818c948dd0f511fbff873bc1a0b36f9ec6f5563dea95746abf19d47a54b47774aeeca5e4171eaf4f96b41829e1040cff03b6decf1cbc650085456efceb3009e7b2e3e078e1f8b91e9a9e5cf885e7dd35c4cd498bb26ce47f6130b9395e31d70b9f1642b421e178b7779e16fee6701b19dd5afaaa445cb0b5eeef6", 0xa7, 0xc5}, {&(0x7f0000000800)="656e94e2e99b132dc1342c12cd10e7c14e645476e5a0a5b2d0a07f385cf3d5eaaf292b54d6ac966762743e33fc02be5f491f7f7077223d7e1ad7d532dab1f5e5230ccfc9d4704ba9cb2397d76d24520423dacb64a5b9bc1441081c606e768ae6b81e54dbc6860908", 0x68, 0xfffffffffffffffa}], 0x7000, &(0x7f0000000940)=ANY=[@ANYBLOB='uni_xlate=0,shbrtname=winnt,hash,smackfshat=em1,smackfshat=wlan0keyring/,obj_role=TIPCv2\x00,pcr=00000000000000000007,dont_appraise,dont_measure,context=sysadm_u,defcontext=root,cmackfsfloor=TIPCv2\x00,\x00']) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) io_setup(0x2, &(0x7f0000000000)=0x0) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='system.posix_acl_default\x00', &(0x7f0000000a40)='/selinux/mls\x00', 0xd, 0x2) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000100)) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000, 0x407000}]) truncate(&(0x7f0000000080)='./bus\x00', 0x416ffe) exit(0x0) timer_create(0x0, 0x0, &(0x7f0000000300)) write(r2, &(0x7f00000071c0)="1b267dbcb2a85cf7ef14b55f3c4dee67cc7005d56607fb05c5a517f37215086b94b5c0d2b01922f6ab528b7095bf9d198d75b5927e6b939d978301d8a5103ca043ef8f501f430cbae9ec41c419ba3ae812e0b9a4297c462864dd0d503b63d3f800c7fd3dbef47f1c858486a50d3d3b27ae10556cb0110c791d2b2804b66b8cae8d3a7f302efb9eb942ad34c31dff19d9b866c6c77dbc468673d64c95f137745028e33c35df831b91c6aa98a2d8103ffa5d45b52521fb19ba5b754cf8a40aac258e2858aecd231b1340de55477982a25608edc7", 0xd3) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000040)={'team0\x00'}) creat(0x0, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ftruncate(r2, 0x0) 20:34:46 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x3) r1 = socket$inet6(0xa, 0x2, 0xffffffff) connect$inet6(r1, 0x0, 0x0) 20:34:46 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000100)) r1 = dup(r0) write$P9_RCREATE(r1, &(0x7f0000000000)={0x18, 0x73, 0x2, {{0x27, 0x3, 0x1}, 0x4}}, 0x18) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) 20:34:46 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r2 = gettid() ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={'veth0_to_team\x00', {0x2, 0x4e22, @broadcast}}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000180)={[], 0x5, 0xccab, 0x78654c82, 0xfffffffffffffffa, 0x21a, r2}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000040)=@ethtool_drvinfo={0x3, "e4f4e3fb1ec4c0d5b3e154be905efde4dc438cbb8c8fe93f19fef58342ba0fa7", "d438a107cddb572e8bc082e2e3a898c49cfed048def1858bfbe993457bda6904", "8b7eff64e0e7174a2e2637b7bd6cc2b8eba1ea28dfce5d7ab6e25f5495a77aed", "9c68e50f51074dc5c4c012a8fb0eede76c230ac86611cc2e1e507b85a81ac4e0", "18baec7e2eeb93c196aae0c3436a7f8253a8ca30c6f945e0fc9378f43eb94cf2", "20816b15456feb775750e575"}}) socket$inet6(0xa, 0x80a, 0x5) 20:34:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="b40000000000000005000000d0ffffff9500000000001f00"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 20:34:46 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x101000, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast1, 0x9}, 0x1c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0xff, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) r2 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000280)='./file2\x00', 0x0, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r2, &(0x7f00000000c0)='./file2\x00', r2, &(0x7f00000001c0)='./file1\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000440)=0xe8) fstat(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@mcast1, @in=@initdev}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@loopback, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000008c0)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file1\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, &(0x7f0000000b00)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0, 0x0}, &(0x7f0000000b80)=0xc) getgroups(0xa, &(0x7f0000000480)=[r8, r7, r9, r8, r9, r7, r7, r8, r8, r7]) fstat(0xffffffffffffffff, &(0x7f0000000e00)) r10 = getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file2\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010000000000000002000600", @ANYRES32=r4, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000600", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=r5, @ANYBLOB="02000100", @ANYRES32=r6, @ANYBLOB="040003000000000008000200", @ANYRES32=r9, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000400000000000000000000000000"], 0x6c, 0x1) r11 = geteuid() r12 = geteuid() setreuid(r11, r12) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x7, 0x5, 0x0, 0x8, 0x0, 0x81, 0x0, 0x0, 0x7923, 0x0, 0x6, 0x8, 0x5, 0x3, 0x7, 0x7ff, 0x8, 0x7, 0x9c, 0x9, 0xffff, 0x3, 0x10001, 0x7, 0x1f, 0x8000000, 0x1000, 0xffffffff, 0x401, 0x7ff, 0x2, 0x2ae, 0x2, 0x0, 0x5e8, 0x80000000, 0x0, 0x101, 0x0, @perf_bp={0x0, 0xf}, 0x43, 0x4, 0x6, 0xf, 0x0, 0x6, 0x7fff}, r13, 0x10, r1, 0x7) 20:34:46 executing program 5: r0 = mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x3d, &(0x7f00000000c0)="76bd4e00956619bc69b21b009c455258b3ccd4d8b86d510e6a89d3d98955ba5b7323941e8f1aa8eded0bcbdad90493cb9bb8b017ed0ac2eb5480d7a92b9df7e72d78b8e0c7c7eb972292ba33ad106d9cddbb175aebdd34339503decf1f62b3c5", 0x60) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r1, 0x0) ioctl$void(r1, 0x5451) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000040)={r0}) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) r5 = add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r4) keyctl$KEYCTL_PKEY_QUERY(0x18, r5, 0x0, &(0x7f0000000200)='$self\x00', &(0x7f0000000240)) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f00000001c0), 0x1) 20:34:47 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x101000, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast1, 0x9}, 0x1c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0xff, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) r2 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000280)='./file2\x00', 0x0, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(r2, &(0x7f00000000c0)='./file2\x00', r2, &(0x7f00000001c0)='./file1\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000440)=0xe8) fstat(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@mcast1, @in=@initdev}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in=@loopback, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000008c0)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file1\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, &(0x7f0000000b00)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0, 0x0}, &(0x7f0000000b80)=0xc) getgroups(0xa, &(0x7f0000000480)=[r8, r7, r9, r8, r9, r7, r7, r8, r8, r7]) fstat(0xffffffffffffffff, &(0x7f0000000e00)) r10 = getgid() setxattr$system_posix_acl(&(0x7f00000002c0)='./file2\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="02000000010000000000000002000600", @ANYRES32=r4, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000600", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=r5, @ANYBLOB="02000100", @ANYRES32=r6, @ANYBLOB="040003000000000008000200", @ANYRES32=r9, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000400000000000000000000000000"], 0x6c, 0x1) r11 = geteuid() r12 = geteuid() setreuid(r11, r12) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x7, 0x5, 0x0, 0x8, 0x0, 0x81, 0x0, 0x0, 0x7923, 0x0, 0x6, 0x8, 0x5, 0x3, 0x7, 0x7ff, 0x8, 0x7, 0x9c, 0x9, 0xffff, 0x3, 0x10001, 0x7, 0x1f, 0x8000000, 0x1000, 0xffffffff, 0x401, 0x7ff, 0x2, 0x2ae, 0x2, 0x0, 0x5e8, 0x80000000, 0x0, 0x101, 0x0, @perf_bp={0x0, 0xf}, 0x43, 0x4, 0x6, 0xf, 0x0, 0x6, 0x7fff}, r13, 0x10, r1, 0x7) 20:34:47 executing program 5: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) r0 = epoll_create1(0x80000) fcntl$setpipe(r0, 0x407, 0x6) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0xa) fcntl$setstatus(r3, 0x4, 0x4000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r6, 0x0) write$P9_RSTATu(r5, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1], 0x17) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) accept4(r2, &(0x7f0000000180)=@xdp, &(0x7f0000000000)=0x80, 0x80000) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0xfffffc1d}]) 20:34:52 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:34:52 executing program 2: time(&(0x7f0000005ac0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000005500)=0x64, 0x6dc) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000005200), 0xffffffffffffffff) r1 = add_key(&(0x7f0000005980)='asymmetric\x00', &(0x7f0000005600)={'syz', 0x0}, &(0x7f00000059c0)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6807a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(&(0x7f00000052c0)='./file0\x00', 0x3007c, 0x12) exit(0x7fff) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {0x0}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {&(0x7f0000004dc0)=""/72, 0x48}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000064c0)=ANY=[]}}, 0x4000c41) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000005480), &(0x7f0000005380)=0x40) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005640)='team\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'bond_slave_0\x00'}) accept$packet(r0, &(0x7f00000055c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000053c0)=0x8) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005b00)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xfffffffffffffd0d) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000005c40)={'team0\x00', r5}) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:34:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) unshare(0x400) bind$unix(r0, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e22}, 0xf9fbd08d505434d5) prctl$PR_SET_SECUREBITS(0x1c, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40000, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000100)={0x1, 'hsr0\x00', 0x1}, 0x18) 20:34:52 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x2f, &(0x7f0000000000)={@dev, @initdev, @empty}, &(0x7f0000000040)=0xc) connect$inet6(r1, 0x0, 0x0) 20:34:52 executing program 5: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x3c5) keyctl$session_to_parent(0x12) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000140)={0x30000001}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x20000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4000000000000}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000300)) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000001640)=""/4096, &(0x7f00000004c0)=0x1000) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x2) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000600)={0x2a, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="050000004001000080b7680ac96edda2e6801ee3acec15325b893519e0174d1fb8000000000000000000000000008c65a574dff6a79d3b1632330271c6e3f55832abd9d19261ae4109fb79152bdc92d610a50f8d686db0bdc7217571e9ed84ae3ef1ba99d0d319a36e86dacafe7522553f75f737ef337f9908f1b014f8e7101e997db2b3e9b3cafa5d5f7ffaa434fe85f741677d0380da4e510f4c2d8400e5ff9c104580e71ce3b6eeba5c36f2362fc689073553237414c18516b6af4ca67ce560bd50682f89fec250b9d0d5ebbb5b884e31afaef1800ac483ca8f8bdfb1e78f6f68dad7"], 0x0, 0x0, 0x0}) clone(0x60002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="8964bc06141857d9b8c216c1188ac4d123f8cbf72d4d4b649656d0d0b242e583a00396a55ab62bc3da8ea2943fdb7c659bdc39bd3c5ebfd6320422f2742deb8c5dda9ac7ce76a7da1769a20100bcb3164b6fa2b0eb37d271b7ab00417d214eac605b348f03081fcd6795b4783f94976d566a98637a6f089ffd5b23408a9b2a2e95f338488a4668fc13514001064bd6f6bce433301b6fc8655e577c8601c923dbf764feaf8f6de779a2528c0f0b5c4bb7bd5f35e22855e8f3c58ca0c50cf9042bf3a7587bfce83707fe67693e8294bbaf9c"]) r3 = socket(0x11, 0x80000, 0x9fa) r4 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000001c0)=0x0) syz_open_procfs(r6, &(0x7f0000000280)='net/sockstat6\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000480)='/dev/urandom\x00', 0x0, 0x0) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000080)=0x9) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) ioctl$PPPIOCGIDLE(r5, 0x8010743f, &(0x7f0000000180)) 20:34:52 executing program 0: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/netstat\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r2, &(0x7f0000000300)={'syz0', "6d0f00ca5543386fb9f90379482f4ae7ca03ec42730a6c1aab2f0685e4896056e5add8a6083c7481f4e6c1ab41029ed198042431ed68d946ae0b3e22580e1b88ec52dc78e0557da1438349380a6cf281cbca43838e6cbf9dc2dd1592bb1c4bad6dca2a"}, 0x67) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={@remote, @empty, @mcast1, 0x4, 0x0, 0x3, 0x400, 0x3, 0x0, r3}) prctl$PR_GET_NAME(0x10, &(0x7f0000000100)=""/56) 20:34:52 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42002) r0 = memfd_create(&(0x7f0000000440)='nodevmime_type{[^)%#md5sum\x00', 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x400, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000140)={0x1, 0x3}) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x7, 0x7fff, 0x6446, 0x80000000}, {0x6, 0xff, 0x6, 0x2}, {0x2, 0xffffffffffff3b62, 0x3ff, 0x1}, {0x5, 0x1ff, 0x0, 0x1}, {0x8001, 0x100, 0x9, 0x7f}]}) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000040)) fcntl$dupfd(r0, 0x406, r2) [ 2286.438821] kauditd_printk_skb: 126 callbacks suppressed [ 2286.438830] audit: type=1400 audit(1549744492.340:10203): avc: denied { map } for pid=12066 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2286.499219] audit: type=1400 audit(1549744492.340:10204): avc: denied { map } for pid=12066 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2286.527362] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2286.541439] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 20:34:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001d1300001a4c749bddc2c3000000000000", @ANYRES32=0x0, @ANYBLOB="0000b90008000100ac1414aa"], 0x24}}, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x501000, 0x20) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000001c0)=""/221) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) ioprio_set$uid(0x3, r2, 0x1) [ 2286.568205] attempt to access beyond end of device [ 2286.583099] loop5: rw=12288, want=8200, limit=20 [ 2286.589960] attempt to access beyond end of device [ 2286.600672] audit: type=1400 audit(1549744492.380:10205): avc: denied { map } for pid=12069 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2286.634893] loop5: rw=12288, want=12296, limit=20 [ 2286.651377] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 2286.673445] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2286.677739] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4893 sclass=netlink_route_socket pig=12084 comm=syz-executor.3 [ 2286.695057] audit: type=1400 audit(1549744492.390:10206): avc: denied { map } for pid=12069 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2286.719583] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 2286.725236] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4893 sclass=netlink_route_socket pig=12084 comm=syz-executor.3 [ 2286.738115] attempt to access beyond end of device [ 2286.757468] loop5: rw=12288, want=8200, limit=20 20:34:52 executing program 3: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) capset(&(0x7f0000000440)={0x19980330}, &(0x7f0000000480)) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) write$P9_RMKNOD(r0, &(0x7f0000000000)={0x14, 0x13, 0x1, {0x0, 0x2, 0x3}}, 0x14) [ 2286.767781] audit: type=1400 audit(1549744492.390:10207): avc: denied { map } for pid=12069 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2286.794811] attempt to access beyond end of device [ 2286.800874] loop5: rw=12288, want=12296, limit=20 [ 2286.805951] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 2286.813984] audit: type=1400 audit(1549744492.390:10208): avc: denied { map } for pid=12069 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2286.850904] audit: type=1400 audit(1549744492.400:10209): avc: denied { map } for pid=12069 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2286.887113] audit: type=1400 audit(1549744492.400:10210): avc: denied { create } for pid=12064 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2286.960760] audit: type=1400 audit(1549744492.400:10211): avc: denied { write } for pid=12064 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:34:52 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f0000000100)='syz0\x00', 0x1ff) signalfd(r0, &(0x7f0000000080), 0x8) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) [ 2287.016337] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2287.046280] audit: type=1400 audit(1549744492.430:10212): avc: denied { map } for pid=12077 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2287.053003] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 2287.126598] attempt to access beyond end of device [ 2287.143503] loop5: rw=12288, want=8200, limit=20 [ 2287.159035] attempt to access beyond end of device 20:34:53 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f00000003c0)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 2287.175014] loop5: rw=12288, want=12296, limit=20 [ 2287.201480] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 2287.250839] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2287.272836] binder: BINDER_SET_CONTEXT_MGR already set [ 2287.282120] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 2287.285665] binder: 12107:12108 ioctl 40046207 0 returned -16 [ 2287.306782] attempt to access beyond end of device [ 2287.327084] loop5: rw=12288, want=8200, limit=20 [ 2287.327789] binder: 12107:12108 got transaction to invalid handle [ 2287.343447] binder: 12107:12108 transaction failed 29201/-22, size 0-0 line 3012 [ 2287.343760] attempt to access beyond end of device 20:34:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000080)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='cpuset\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x4df61b33f7a22db3, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc801}, 0x44080) [ 2287.373158] loop5: rw=12288, want=12296, limit=20 [ 2287.391069] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 2287.392133] binder: undelivered TRANSACTION_ERROR: 29201 [ 2287.410655] binder: release 12107:12108 transaction 194 out, still active [ 2287.432555] binder: unexpected work type, 4, not freed [ 2287.445591] binder: undelivered TRANSACTION_COMPLETE [ 2287.945364] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3949 sclass=netlink_route_socket pig=12119 comm=syz-executor.0 [ 2288.067007] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3949 sclass=netlink_route_socket pig=12119 comm=syz-executor.0 20:34:54 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:34:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="3000000010000108000000000000000000000000", @ANYRES32=0x0, @ANYRESDEC=0x0], 0x3}}, 0x10000000) 20:34:55 executing program 5: clone(0x3002001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x22) ptrace$cont(0x20, r0, 0x7, 0x40) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast2, @ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x122}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 20:34:55 executing program 3: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x4, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "ed72df04afd343acfa17e8926aa00954"}, 0x11, 0x2) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x118, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="08631040", @ANYRES64=0x0, @ANYBLOB="00000000000000000e630c4003000000040000000000000001634040000000000000000000000000000000000000000011000000000000000000000000000000000000002800000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="40000000000000001800000000000000000000000000000000000000000000000000000000000000"], @ANYBLOB="0b630000016340400300000000000000000000000000000000000000000000000000000000000000000000000000000028000000000000000000000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\b'], @ANYBLOB="12634840040000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff0000000000000000080000000000000008631040", @ANYRES64=0x0, @ANYBLOB="02000000000000000563044001000000"], 0x43, 0x0, &(0x7f0000000280)="3c1e50de3c7ada177310b27f43b50180466c80644e7a0cb383705e4616c62bfdc02d1806b7b060bb3559f266029e862a81e9fe0f8182e2cdee5fbcfceb9eea5d29b02c"}) 20:34:55 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x400) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000500)=0x949, 0x4) fcntl$setstatus(r2, 0x4, 0x42000) sendmmsg(r2, &(0x7f00000002c0), 0x400000000000174, 0x0) setresuid(0x0, 0xee01, 0x0) ftruncate(r1, 0x7ff) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00002cbd7000fddb5f25a1e923ae240009000800020009000000080002008000000008000200010000000800010004000000"], 0x38}}, 0x0) 20:34:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$P9_RUNLINKAT(r0, &(0x7f0000000000)={0x7, 0x4d, 0x1}, 0x7) write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) 20:34:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x20000000c) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a78000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f000087b000/0x4000)=nil) timerfd_create(0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x100000, 0x4) [ 2289.239077] binder: 12143:12148 BC_INCREFS_DONE u0000000000000000 no match [ 2289.254901] binder: 12143:12148 BC_REQUEST_DEATH_NOTIFICATION invalid ref 3 [ 2289.268404] binder: 12143:12148 got reply transaction with bad transaction stack, transaction 198 has target 5274:0 [ 2289.282006] binder: 12143:12148 transaction failed 29201/-71, size 0-40 line 2935 [ 2289.305018] binder: release 12143:12148 transaction 200 out, still active [ 2289.319654] binder: undelivered TRANSACTION_COMPLETE 20:34:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) io_setup(0x400, &(0x7f0000000040)=0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r1}]) [ 2289.333106] binder: release 12143:12148 transaction 198 out, still active [ 2289.345853] binder: undelivered TRANSACTION_COMPLETE [ 2289.351614] binder: undelivered TRANSACTION_ERROR: 29201 20:34:55 executing program 3: r0 = socket$inet(0x2, 0x7, 0xfffffffffffffffc) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000380)=0x14, 0x80000) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000003c0)={0x80, 0x6, 0x1000}, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000080)=0x3, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f000068cffc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040), 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x134, r3, 0x28, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x513}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x100}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x200}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xa4a}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3c3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004044) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f00000000c0)=0x1, 0xfffffffffffffde0) 20:34:55 executing program 1: getpgrp(0xffffffffffffffff) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000140)='attr/sockcreaTe\x00&\xa0\xd1\xf2\x10\xf9\x16E\v\xce\t\xecs\xb3\xbe\xaa\xb0\x18\xdf\x84|vW\xb0=\xf8\x10\xa4#3A\xc8\xe6\r:\\\x1d.\xdb\x1e\x1amdi\xc580\xd4\f') openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x8800, 0x0) write$selinux_context(r1, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0xffffffffffffff16) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) 20:34:55 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1020, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x2380, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x95) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x20000) close(r0) 20:34:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x20000000c) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a78000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f000087b000/0x4000)=nil) timerfd_create(0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x100000, 0x4) 20:34:57 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000001c0)={0xfffffffffffffff7, 0x101, 0xa, 0x0, 0x0, [{r0, 0x0, 0xffffffffffff3e67}, {r0, 0x0, 0x7}, {r0, 0x0, 0x3}, {r0, 0x0, 0x100000000}, {r0, 0x0, 0x80000000}, {r0, 0x0, 0x8}, {r0, 0x0, 0x4}, {r0, 0x0, 0x3}, {r0, 0x0, 0x8}, {r0, 0x0, 0x80e4}]}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r2, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, 0x0, 0x0) 20:34:57 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) [ 2291.951419] kauditd_printk_skb: 97 callbacks suppressed [ 2291.951428] audit: type=1400 audit(1549744497.860:10310): avc: denied { create } for pid=12199 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=udp_socket permissive=1 [ 2291.983236] audit: type=1400 audit(1549744497.890:10311): avc: denied { connect } for pid=12199 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=udp_socket permissive=1 [ 2292.007864] audit: type=1400 audit(1549744497.890:10312): avc: denied { map } for pid=12201 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.074755] audit: type=1400 audit(1549744497.980:10313): avc: denied { create } for pid=12202 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2292.099646] audit: type=1400 audit(1549744497.980:10314): avc: denied { write } for pid=12202 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2292.124169] audit: type=1400 audit(1549744497.980:10315): avc: denied { map } for pid=12207 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.148065] audit: type=1400 audit(1549744497.980:10316): avc: denied { map } for pid=12207 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:34:58 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mknod(&(0x7f0000000ac0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000480)='X', 0x1}], 0x1, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 20:34:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x20000000c) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a78000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f000087b000/0x4000)=nil) timerfd_create(0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x100000, 0x4) 20:34:58 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x400) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000500)=0x949, 0x4) fcntl$setstatus(r2, 0x4, 0x42000) sendmmsg(r2, &(0x7f00000002c0), 0x400000000000174, 0x0) setresuid(0x0, 0xee01, 0x0) ftruncate(r1, 0x7ff) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00002cbd7000fddb5f25a1e923ae240009000800020009000000080002008000000008000200010000000800010004000000"], 0x38}}, 0x0) 20:34:58 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000000240), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x100, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x19, 0x17, 0x2, {0x10, './file0/../file0'}}, 0x19) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futex(&(0x7f0000000000)=0x1, 0x1, 0x2, &(0x7f0000000080)={r1, r2+10000000}, &(0x7f00000000c0), 0x0) 20:34:58 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)=0x1) write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) [ 2292.170776] audit: type=1400 audit(1549744497.980:10317): avc: denied { read } for pid=12202 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2292.275936] audit: type=1400 audit(1549744498.180:10319): avc: denied { map } for pid=12213 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2292.325046] audit: type=1400 audit(1549744498.170:10318): avc: denied { create } for pid=12208 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 20:34:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x20000000000002, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x104) 20:34:58 executing program 5: r0 = socket(0x10, 0x80003, 0xc) write(r0, &(0x7f0000000440)="1f0000000104ff00fd4354c007110000f305010008000100020423dcffdf11", 0x1f) 20:34:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) [ 2292.646705] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. 20:34:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x803}) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) r2 = socket$inet(0x15, 0x80805, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu}) 20:34:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x20000000c) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a78000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f000087b000/0x4000)=nil) timerfd_create(0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x100000, 0x4) 20:34:59 executing program 3: clone(0x3102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x2, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) socket(0x4, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000040)=0x40, 0x4) 20:34:59 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7001) 20:34:59 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:34:59 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000000)=0x2) 20:35:00 executing program 0: 20:35:00 executing program 5: 20:35:00 executing program 2: 20:35:00 executing program 3: 20:35:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x2, &(0x7f0000000100)=[{&(0x7f00000000c0)}, {&(0x7f00000001c0)="959e70e4d58adb754d23c4cdb578dbce60cfaff7ee293728ffe01f701deb334ce8413455dad927544235f62a6eb4521cb8c7edcc82c49cb5f76461f541dd1e6ca4b184e2337df173f7f285da6181f7cb39aabb225002f121bfe7c9deef7ca7f725c7e6ee0393e0f08011db3a16896a0213afd10aba3f3ec88287bbcc2ba1b2b13e39933d21e1677de5e3d842d71f1536c3318214b57587b76a3464793d612ebc93e764853fcc62a1abe79af88f9c03", 0xaf, 0x6d}], 0x8000, &(0x7f0000000280)={[{@rodir='rodir'}, {@numtail='nonumtail=0'}, {@utf8='utf8=1'}, {@utf8no='utf8=0'}, {@utf8='utf8=1'}, {@shortname_winnt='shortname=winnt'}, {@fat=@sys_immutable='sys_immutable'}]}) write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0xa9, @rand_addr="2ab5b713c642b9b99d9167ccc7dd501c", 0x2}, 0x1c) connect$inet6(r1, 0x0, 0x0) fsync(r0) 20:35:00 executing program 2: 20:35:00 executing program 5: 20:35:00 executing program 3: 20:35:01 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="02042dbd7000fc000c000200080002004e200015080004004d00000014000100080005000000000008000900770000003000030414000600005a45efe7060000000000000000ffffffffffff08000500ac1414bb0801080600000000080007004e2100005d000407fd844378fd536307379e023b0057cc8d237c282918bf40128fdd6d3b9ac482627a4173f3d26080b3c8b5214ac76597d9a4d5c5f058fbaf5db704622f62cc1af932e0528eb34a90a84ac1c603a85d273d347ff41a975e64c21ed24b7c3f1596b3a3b5cf68f308b7a38dd4b1daf82a3b87278b21c0492bed58e01e7d4783050000004ca3b4c5fae4639ab635054f469722e95dada1f361a949d0ee460e313674d470024bb54db260eda4974fb622698c2fc2596bdaa96040ca178df4d5757fb1257c3001000000000000002ca33d107e770f50c11f8938e560522aa795b7c84cf2de19d16e42046de61e3775326e9ab668ac894a6598cd1b85c9e18cef07fd016f12c89e37719a5b39777f18a1634fa8772cee025e11d36fda12a3359a014e784ef0a0ca7c41feb23ac0926b953c9a4f9a7f77e64e49b083559a2e4f7014d036968a351fb5f8c3abb2c2db422c041c5533518615a07413afe59cdf2d55da68"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:35:01 executing program 2: 20:35:01 executing program 3: 20:35:01 executing program 5: 20:35:01 executing program 0: 20:35:01 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x8) connect$inet6(r1, 0x0, 0x0) 20:35:01 executing program 3: 20:35:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)) 20:35:01 executing program 5: syz_execute_func(&(0x7f0000000200)="3666440f50f564ff0941c344ee9dc01497f5f26f42b0796e0266420fe2e3f3450f2c550baa6114f241d1e7d3196f") clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = inotify_init() r3 = dup3(r1, r2, 0x0) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, 0x0) r4 = dup2(r0, r0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 20:35:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000240)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}) read(r1, &(0x7f0000000100)=""/19, 0x13) 20:35:01 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 20:35:01 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000100)={0x10, 0x5}, 0xc, &(0x7f0000beeff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) 20:35:07 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:35:07 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000200)=0x8, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x40000, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000002c0)=""/73) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000180)='selinux*posix_acl_access#(trustedcgroupselinuxppp0.\x00') r3 = socket$inet(0x10, 0x0, 0xf6) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000240)=0xffffffffffffffff) sendmsg(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000005a0007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 20:35:07 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) accept4$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) pipe(&(0x7f0000000080)) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) 20:35:07 executing program 0: r0 = socket$packet(0x11, 0x40800000000003, 0x300) fstat(r0, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x40000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_aout(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="080100007d020000ad0300009b010000320000000000000008000000000000001906ce3bea8825ff8b0efabdf1e01cf68b7dcb3f97e626eb79d073cf3b67bb700fb56f275e0d9fcfd1f94bf6"], 0x4c) 20:35:07 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt(r0, 0x3a, 0x0, 0x0, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=""/236, &(0x7f0000000100)=0xec) 20:35:07 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0xde) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000002c0)={0x0, @empty, @multicast2}, &(0x7f0000000300)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) getsockname$packet(r0, &(0x7f0000006b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006bc0)=0x14) recvmsg(r1, &(0x7f0000007f40)={&(0x7f0000006c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000006c80)=""/235, 0xeb}, {&(0x7f0000006d80)=""/4096, 0x1000}, {&(0x7f0000007d80)=""/101, 0x65}], 0x3, &(0x7f0000007e40)=""/227, 0xe3}, 0x40002000) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000081c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000008180)={&(0x7f0000007f80)={0x1cc, r2, 0x400, 0x70bd28, 0x25dfdbff, {}, [{{0x8}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}]}}, {{0x8, 0x1, r4}, {0xbc, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r6}}}]}}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x40000}, 0x801) connect$inet6(r1, 0x0, 0x0) 20:35:07 executing program 5: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0xd7, "838b288ce98aca0096a4876da98c86f57cf0639dd8fe77109ae91bcc0ec39941f6dfbcdfd2c014b165196b6400a1d5bc48b300d24e5f9b7dde6fe036e347a139e832dfe8b7adf56c38ed00984208c0eb224f6014c256917a4fba4f8f85b99c1ec71127ead3f6a0a603555afdb315c303553ba430572d50b04a8ff0fb30ae4118e6f9297913b701cfdca6e69155f965f87960b44ff8ebf6cfbf05f418a25df83d43978367f194883d1a4ae992ddfe33261724a13da27b58d9c084d87a2e510a6d9dc8d387171a8af13c0e9f21228e31ef594b77c871c41a"}, &(0x7f00000001c0)=0xfb) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0xc004) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) flistxattr(r2, &(0x7f0000000040)=""/32, 0xfffffffffffffe4d) [ 2301.857293] kauditd_printk_skb: 104 callbacks suppressed [ 2301.857301] audit: type=1400 audit(1549744507.760:10424): avc: denied { map } for pid=12364 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:35:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) setsockopt$inet6_group_source_req(r2, 0x29, 0x2d, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr="fe141aa0c70da72e5a221d606884ab03"}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) getsockopt$inet_int(r2, 0x0, 0x3f, &(0x7f0000000040), &(0x7f00000000c0)=0x4) tkill(r3, 0x3c) fcntl$setstatus(r2, 0x4, 0x42803) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000002c0)={0x800, {{0xa, 0x80000000, 0x1, @mcast2}}}, 0x88) [ 2301.970484] audit: type=1400 audit(1549744507.790:10425): avc: denied { create } for pid=12359 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=rawip_socket permissive=1 20:35:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x1003) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000280)="290000002000190000003fffffffda060200000000e80001060000040d000300ea1100000005000000", 0x29}], 0x1) setsockopt$inet_int(r0, 0x0, 0xc, 0x0, 0x0) [ 2302.065772] audit: type=1400 audit(1549744507.790:10426): avc: denied { map } for pid=12369 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2302.162601] audit: type=1400 audit(1549744507.790:10427): avc: denied { map } for pid=12364 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2302.240149] audit: type=1400 audit(1549744507.790:10428): avc: denied { map } for pid=12364 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2302.291527] audit: type=1400 audit(1549744507.800:10429): avc: denied { map } for pid=12369 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2302.440323] audit: type=1400 audit(1549744507.800:10430): avc: denied { map } for pid=12369 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2302.466610] audit: type=1400 audit(1549744507.800:10431): avc: denied { map } for pid=12369 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2302.492644] audit: type=1400 audit(1549744507.810:10432): avc: denied { map } for pid=12369 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:35:08 executing program 5: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={{0x77359400}, {0x77359400}}) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200100, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000240)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) write$P9_RGETLOCK(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2f0000003701000002000000000000005dea000000000000", @ANYRES32=r1, @ANYBLOB="11002f64656b2f8167615f61726269746572001038ae16b551ffee8364847b7c0685ed03774c9bcef6ffdb8d2b13c20f5b08102be05c59464050fd789337dbf336298926d4ae283000000000000000000000000000"], 0x2f) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000004c0)=ANY=[@ANYBLOB="05000000000000000a004e2400000000fe8000000000000000000000000000bb0100000000000000000000000000000000000000000000000000eaffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000060000000a004e22fffffff8ff020000000000000000000000000001840f0000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2000000920fe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e240000000900000000000000000000ffffac1e010107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e24000008000000000000000000000000000000000107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a006e2200000040fe80000000000000000000000000002b01040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2000000004000000000000000000000000000000010080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x390) [ 2302.523375] audit: type=1400 audit(1549744507.840:10433): avc: denied { map } for pid=12373 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:35:08 executing program 5: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8010, 0xffffffffffffffff, 0x2) mprotect(&(0x7f000099c000/0x1000)=nil, 0x1000, 0x1000000) 20:35:08 executing program 5: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x10000000018, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e23, 0x0, @mcast1, 0x5}, {0xa, 0x4e24, 0x7, @loopback, 0x1}, 0x9, [0x2, 0x6, 0x40000000, 0x4, 0x1f0, 0x200, 0x9, 0x4]}, 0x5c) 20:35:14 executing program 5: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x2) fcntl$setstatus(r1, 0x4, 0x4000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180)={0xcd2c, 0x5, 0x0, 0xffff, 0xfffffffffffffffe, 0x1, 0x100, 0x7}, &(0x7f00000001c0)={0x8ed1, 0x8, 0x7, 0x6b, 0x9, 0x5d8, 0x8, 0x4}, &(0x7f0000000240)={0x3, 0xffffffff, 0xfffffffffffffff7, 0x1c9, 0x40, 0x1, 0x40, 0xfffffffffffff801}, &(0x7f0000000300)={r4, r5+30000000}, &(0x7f0000000380)={&(0x7f0000000340)={0xc4}, 0x8}) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x9144) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r6, 0x0) write$P9_RSTATu(r3, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000003c0)={0xe31f, 0x0, 0x8, 0x100, 0x7f}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x200}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0xfffffc1d}]) 20:35:14 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="02042dbd7000fc000c000200080002004e200015080004004d00000014000100080005000000000008000900770000003000030414000600005a45efe7060000000000000000ffffffffffff08000500ac1414bb0801080600000000080007004e2100005d000407fd844378fd536307379e023b0057cc8d237c282918bf40128fdd6d3b9ac482627a4173f3d26080b3c8b5214ac76597d9a4d5c5f058fbaf5db704622f62cc1af932e0528eb34a90a84ac1c603a85d273d347ff41a975e64c21ed24b7c3f1596b3a3b5cf68f308b7a38dd4b1daf82a3b87278b21c0492bed58e01e7d4783050000004ca3b4c5fae4639ab635054f469722e95dada1f361a949d0ee460e313674d470024bb54db260eda4974fb622698c2fc2596bdaa96040ca178df4d5757fb1257c3001000000000000002ca33d107e770f50c11f8938e560522aa795b7c84cf2de19d16e42046de61e3775326e9ab668ac894a6598cd1b85c9e18cef07fd016f12c89e37719a5b39777f18a1634fa8772cee025e11d36fda12a3359a014e784ef0a0ca7c41feb23ac0926b953c9a4f9a7f77e64e49b083559a2e4f7014d036968a351fb5f8c3abb2c2db422c041c5533518615a07413afe59cdf2d55da68"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:35:14 executing program 2: socket(0x8, 0xa, 0x6) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'!! ', './file0'}, 0xfdef) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) gettid() syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r1 = socket(0x8, 0x80800, 0x7) fcntl$dupfd(r0, 0x406, r1) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) 20:35:14 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/keycreate\x00', 0x2, 0x0) ioctl(r0, 0x80000001, &(0x7f00000000c0)="6a93a01a915d388f97ee090e2427acbc22fe1df6d872a2544f6afaf7f9be39f344fad578fff53fb363c8cdcc6f9332c862cb07d59b59f88fc39e8398c25b998ade942ea3849cf4c1cfb6d1210138eb7fda3795cf14213fe4975a43339845356548227843425976c497a344c2a05e0c1297cefb0a270ecb3d7ba6fca3a558d44d7ea752efa15973a1bcc20191bd84efd4d0ded7") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='a\x9d\x16\xebC\xa2\x12\xce\xb8\x90M9B\xf7\xc6G\x05\x1bent\x00') restart_syscall() getsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000040), &(0x7f0000000180)=0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 20:35:14 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000440)='/dev/urandom\x00', 0x610200, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000200)='/dev/keychord\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000600)) recvmmsg(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, 0x0) splice(r1, &(0x7f0000000000), r0, &(0x7f00000000c0), 0x7fff, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0/../file0/file0\x00', 0x1000000000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="002e4c97fd81ffffff7f1c0367a74634499e54aa4c238f6866e627703a84ab3afd2bd7328a2ee09db1d86b6ce04dc1d29d2e62c55a7bdfca80d9c2a50054a94f4a85a7e81f066349713ed2b48e402f2e662ae9239744deb0ba470000"], 0x0, 0x0, 0x201000, 0x0) chdir(&(0x7f0000000340)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pivot_root(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000480)='./file0\x00') lsetxattr$security_ima(&(0x7f0000000080)='./file0/../file0/file0\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000300)=@v1={0x2, "4f98c40be98181ef"}, 0x9, 0x2) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000001c0)=0x8) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) sync() ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000040)=0x80000400) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000540)="38f7753e8ae07ca11a434bf3a6f2ad88705a24aec9c6e43acd") mknodat(r2, &(0x7f0000000140)='./file0\x00', 0x0, 0x3) wait4(0x0, 0x0, 0x0, 0x0) 20:35:14 executing program 3: r0 = socket(0x2a0000000010, 0x802, 0x0) write(r0, &(0x7f0000000080)="240000001a0025f00485bc04fef7001c0a0b49ffed000000800008000800100001000000", 0x24) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x400000, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) [ 2309.044792] kauditd_printk_skb: 31 callbacks suppressed [ 2309.044801] audit: type=1400 audit(1549744514.950:10465): avc: denied { map } for pid=12435 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:35:15 executing program 3: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x40) close(r0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) write$selinux_create(r0, &(0x7f00000000c0)=@access={'system_u:object_r:udev_exec_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0xe29}, 0x46) fcntl$notify(r0, 0x402, 0xa) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000001b00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001d00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac'], &(0x7f0000001ac0)=[&(0x7f0000002100)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000e40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001040)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001280)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a', &(0x7f0000000180)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001680)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001880)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac']) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000080)=0x5400000000000000, 0x4) [ 2309.121766] audit: type=1400 audit(1549744514.990:10466): avc: denied { map } for pid=12435 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2309.207914] audit: type=1400 audit(1549744514.990:10467): avc: denied { map } for pid=12435 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2309.290185] audit: type=1400 audit(1549744515.010:10468): avc: denied { map } for pid=12424 comm="syz-executor.5" path="/root/syzkaller-testdir373645249/syzkaller.ZtabYm/259/bus" dev="sda1" ino=17644 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 20:35:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x20, @mcast2, 0x5}, 0x1c) r2 = getpgrp(0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x1}, 0x28, 0x3) stat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r3) r4 = syz_open_procfs(r2, &(0x7f0000000000)='stack\x00') r5 = gettid() write$P9_RFSYNC(r4, &(0x7f00000001c0)={0x7, 0x33, 0x2}, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x0, 0x2}, 0x20) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000400)={'veth1_to_bond\x00', 0x3}) socketpair(0x1a, 0x6, 0x6, &(0x7f0000000300)) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3c) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) fcntl$setstatus(r0, 0x4, 0x42803) 20:35:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f0000001f80)='user\x00', &(0x7f0000001fc0)={'syz', 0x3}, &(0x7f0000002000)='+#em0\x00', 0x0) keyctl$get_keyring_id(0x0, r2, 0x2) rt_sigaction(0x0, 0x0, 0x0, 0x8, &(0x7f0000000300)) sendto$unix(r0, &(0x7f0000001cc0)="470a59bd501774e56b5858e18d144a896fefc67ffa82ec1356eb92162c54c7a9678eff9990c85a4116a94ffd8d963151a71be2577fdd871b684b64292ea8f9aac6b4a30a295d5c6269cdfe3532fcd0946164b73965e8fa628cd0389b347d03f1a015e2c81961ee3cb07e7a3377512caf4265cc0495fbe7a4734a03eaf9710313292cfd4ab7107e7193c950f78fed226f03dd6d8f8f4bac825d1b25ddc64b1f384677fb42ac602ff37f9e79f5af575fb4d4efad22ff4f49376d469891fbfbee74b5993c7aee998a043c5f6e6c08dcfce2de4ee2554f0848e24f5e5f", 0xdb, 0x40080, &(0x7f0000001dc0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r3 = socket$inet_udp(0x2, 0x2, 0x0) accept$inet(r3, &(0x7f0000001e40)={0x2, 0x0, @dev}, &(0x7f0000001e80)=0x10) clock_gettime(0x0, &(0x7f0000001b80)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000001ac0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000140)=""/123, 0x7b}, {&(0x7f00000001c0)=""/91, 0x5b}, {&(0x7f0000001340)=""/252, 0xfc}, {&(0x7f0000001440)=""/221, 0xdd}], 0x5, &(0x7f0000001540)=""/80, 0x50}, 0x8}, {{&(0x7f00000015c0)=@hci, 0x80, &(0x7f00000002c0)=[{&(0x7f0000001640)=""/87, 0x57}, {&(0x7f00000016c0)=""/165, 0xa5}, {&(0x7f0000001780)=""/127, 0x7f}, {&(0x7f0000000000)=""/12, 0xc}], 0x4, &(0x7f0000001800)=""/164, 0xa4}, 0x6}, {{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f00000018c0)=""/212, 0xd4}], 0x1, &(0x7f0000001a00)=""/138, 0x8a}, 0x401}], 0x3, 0x40000040, &(0x7f0000001bc0)={r4, r5+30000000}) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001ec0)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$inet6(r6, &(0x7f0000001f00)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000001f40)=0x1c, 0x800) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001c00)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xcc, &(0x7f0000001c40)={{0xa, 0x4e22, 0x75c7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfffffffffffffff9}, {0xa, 0x4e23, 0x10000, @dev={0xfe, 0x80, [], 0x29}, 0x4}, 0x9, [0xffffffff, 0x40, 0x9, 0x7, 0x6, 0x2478, 0x612, 0x100000001]}, 0x5c) [ 2309.375962] audit: type=1400 audit(1549744515.060:10469): avc: denied { create } for pid=12426 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2309.456940] audit: type=1400 audit(1549744515.060:10470): avc: denied { write } for pid=12426 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2309.514136] audit: type=1400 audit(1549744515.060:10471): avc: denied { write } for pid=12433 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:35:15 executing program 2: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x80000000001e) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0x7, 0x1000, 0xffffffff}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="e24ded00000000000000e3f2cbbcc60073926c6ca5ac0fee94d3514643c499c3b8a9203d15073434ede92ff37851d3d15268f55f73846872a816b2ab89c3521da1"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x200000, 0x0) [ 2309.590153] audit: type=1400 audit(1549744515.070:10472): avc: denied { map } for pid=12446 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2309.660139] audit: type=1400 audit(1549744515.070:10473): avc: denied { map } for pid=12446 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2309.710217] audit: type=1400 audit(1549744515.070:10474): avc: denied { read } for pid=12433 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:35:15 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x4000000000000010, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) 20:35:16 executing program 5: connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x4}, 0x3d) connect(r0, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) epoll_create(0x1000) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000228, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) 20:35:16 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc00000003000600000000190200ee00e0000054d81458186fe8b90002000100000000000000020200003f010000000000fca0d900000000000000000000000000000000"], 0x60}}, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) exit(0x0) link(0x0, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x400000000000001e, &(0x7f0000000380)={@local}, &(0x7f0000000340)=0xfffffffffffffdae) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000200)={0x9, 0xc4, 0x1000, 0x5, 0x1d3a}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000240)=""/114) [ 2312.162825] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 20:35:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) get_thread_area(&(0x7f0000000000)={0x4, 0x20001000, 0x0, 0x8, 0x55, 0x9, 0x0, 0x6, 0x9, 0x2}) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getneigh={0x14, 0x1e, 0x1, 0x70bd2c, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x20000010) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xfffffffffffffdac, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x11}]]}}}]}, 0x3c}}, 0x0) 20:35:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000002a00)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect(r0, &(0x7f0000000200)=@pppoe={0x18, 0x0, {0x4, @empty, 'veth1_to_bridge\x00'}}, 0x80) r1 = fcntl$getown(r0, 0x9) r2 = geteuid() fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={r1, r2, r3}, 0xc) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100), &(0x7f0000000180)=0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r4 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000280)=""/158, &(0x7f0000000340)=0x9e) bind$inet6(r4, &(0x7f00000001c0)={0xa, 0x4e20, 0x7fff, @empty, 0xff}, 0x1c) 20:35:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f00000002c0)='syznaller\x00', 0x1000000000000009, 0xcf, &(0x7f0000000080)=""/207}, 0x48) 20:35:21 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:35:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000080)='gt_r:s_bock_t\xfdD\t\x87\x00\x00\x00\x80@\x00\x00\x00', 0x99ac7b67d35fa23a) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm], 0x1) r1 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r1, 0x0, 0x0) 20:35:21 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000001a80), 0x0, 0xfffffffffffffff8) getegid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000001c0)) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x8000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000740)) syz_genetlink_get_family_id$nbd(0x0) getsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000140)=0x4) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800003}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="0004000c00e4ff017a00"], 0x1}, 0x1, 0x0, 0x0, 0x4001}, 0x4) [ 2315.911353] kauditd_printk_skb: 35 callbacks suppressed [ 2315.911362] audit: type=1400 audit(1549744521.820:10510): avc: denied { prog_load } for pid=12527 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:35:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eb000000000000000000000000000200000000000000b3101c2dddd30edbc7f0636eaa26ed6df94dae62d466860514a94af1d7443413af8121d82ef968ae22d143d8c8c694267f87889f4e032d4d"], 0x90) [ 2315.969247] audit: type=1400 audit(1549744521.870:10511): avc: denied { prog_run } for pid=12527 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:35:21 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'vcan0\x00', {0x2, 0x4e20, @remote}}) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) accept(r1, 0x0, 0x0) 20:35:21 executing program 2: r0 = getpgrp(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) r4 = accept(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f00000001c0)=0x80) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x400, 0x0) r6 = syz_open_procfs(r0, &(0x7f0000000240)='wchan\x00') r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x40101, 0x0) pipe2(&(0x7f0000000500)={0xffffffffffffffff}, 0x4000) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x10001, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', 0x200000, 0x4) r12 = openat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x248c02, 0xae) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000008c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xa0040}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x74, r2, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x54, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}, {0x8, 0x1, r11}, {0x8, 0x1, r12}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x4}]}, 0x74}}, 0x20000000) r13 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0xffffffffffffffd0) rt_tgsigqueueinfo(r0, r13, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x4}) rt_sigtimedwait(&(0x7f0000001ff8)={0x3ffff}, &(0x7f0000f0aff0), 0x0, 0x8) 20:35:21 executing program 5: futex(0x0, 0x81, 0x0, 0x0, 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/raw6\x00') ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000040)={0x2, 0x856d, 0x2, 0x1000}) [ 2316.041088] audit: type=1400 audit(1549744521.890:10512): avc: denied { map } for pid=12537 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2316.069655] audit: type=1400 audit(1549744521.900:10513): avc: denied { prog_load } for pid=12527 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2316.093230] audit: type=1400 audit(1549744521.900:10514): avc: denied { prog_run } for pid=12527 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:35:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000040)="592e9ec4df4009f9e74da7d999ca1ba3", 0x10) ioctl$TIOCPKT(r1, 0x5420, 0x0) [ 2316.188281] audit: type=1400 audit(1549744522.020:10515): avc: denied { create } for pid=12548 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:35:22 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r0 = socket(0x1, 0x80001, 0x0) io_setup(0x8, &(0x7f0000000080)=0x0) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cramfs\x00', 0x800000, &(0x7f0000000180)='}vboxnet0bdevselinux\x00') io_submit(r1, 0x2, &(0x7f0000000000)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000080), 0x121}]) [ 2316.218636] audit: type=1400 audit(1549744522.020:10516): avc: denied { write } for pid=12548 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2316.246817] audit: type=1400 audit(1549744522.040:10517): avc: denied { map } for pid=12553 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2316.299554] audit: type=1400 audit(1549744522.040:10518): avc: denied { map } for pid=12552 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2316.337923] audit: type=1400 audit(1549744522.040:10519): avc: denied { map } for pid=12552 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:35:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) r3 = syz_open_pts(r0, 0x0) dup2(r1, r0) dup2(r2, r3) 20:35:22 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000100)=0x7, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e21}, 0x10) socketpair(0xa, 0x4, 0x2, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000004c0)=0x8, 0x4) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000001b8, 0x12001, 0x0) 20:35:22 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14, 0x800) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6}, 0x10) 20:35:29 executing program 3: r0 = memfd_create(&(0x7f0000000300)='\x0f\x02\x80\x05,\x04\xad\xe5\xba\xed\xfa\x9c:!)\xa1\ff\x9a\xeazo\xf1\tB\xd9`_\x05,g\x10KSW\x92Q\xcbo\xdfJ|\xe2\x9bc/\x13\x93-\bH=\xf3\xd1\xb6\xd98\xf5\xc9\xf4\xf8\xa5Ci\x8c\xc6\x85(7\xdc\x12,\b\xca\x88i88\n{H\xe9\x7f[\xea\'\\\x06h\xc9\x14v\x14 \xef\x12\xe5\xa9>\x1e\"\\\x9f@\x1e\xc1\xee1JJ\xa8\xb2\x15\t\xbet\x90\x92', 0x0) write$eventfd(r0, &(0x7f0000000240)=0x20000000000080, 0x8) sendfile(r0, r0, &(0x7f00000000c0), 0xfefe) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x1f, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$setsig(r3, 0xa, 0x3f) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x83, 0x7ff, 0x6, 0xde6, 0x0, 0x80000000, 0x20000, 0x0, 0x20, 0x4, 0x4, 0xfffffffffffffff7, 0xec, 0x9, 0x100000000, 0x5, 0x20, 0x9, 0x2cd6, 0xff, 0x2, 0x7, 0xb8, 0x3fffffff80, 0x6, 0x5, 0x3ff, 0x8c, 0x3, 0x10001, 0x3, 0x3f, 0xffffffffffffffff, 0x4, 0x401, 0xff, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000100)}, 0x0, 0x8, 0x6, 0x3, 0x8, 0x401, 0x10001}, r4, 0x5, r1, 0x1) utimensat(r3, 0x0, &(0x7f0000000200)={{0x77359400}}, 0x0) 20:35:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0xfffffffffffffffc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000003200)={'team0\x00'}) 20:35:29 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@sha1={0x1, "3cf9d28e5f8f2122c6648adc4e80ebd0475f7e3b"}, 0x15, 0x3) r1 = socket$inet6(0xa, 0x800, 0x0) connect$inet6(r1, 0x0, 0x2ee) 20:35:29 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) r1 = epoll_create1(0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80400, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000046e000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)) 20:35:29 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:35:29 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={0x0, @multicast2}, &(0x7f0000000100)=0xc) sendmmsg(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="7acd0f", 0x3}], 0x1}}], 0x1, 0x8000) write(r0, &(0x7f0000000140)="00f3", 0x2) 20:35:29 executing program 2: r0 = creat(&(0x7f00006e9ff8)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x6) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000100)=@v3, 0x18, 0x0) write$smack_current(r0, &(0x7f00000001c0)='security.capability\x00', 0x14) [ 2323.901908] kauditd_printk_skb: 39 callbacks suppressed [ 2323.901917] audit: type=1400 audit(1549744529.810:10559): avc: denied { map } for pid=12618 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2323.982314] audit: type=1400 audit(1549744529.810:10560): avc: denied { map } for pid=12606 comm="syz-executor.3" path=2F6D656D66643A0F0280052C04ADE5BAEDFA9C3A2129A10C669AEA7A6FF10942D9605F052C67104B53579251CB6FDF4A7CE29B632F13932D08483DF3D1B6D938F5C9F4F8A543698CC6852837DC122C08CA886938380A7B48E97F5BEA275C0668C914761420EF12E5A93E1E225C9F401EC1EE314A4AA8B21509BE749092202864656C6574656429 dev="tmpfs" ino=202239 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 20:35:30 executing program 2: r0 = accept$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0xc) keyctl$setperm(0x5, 0x0, 0x0) clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x4000076) munlockall() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000003c0)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'syz_tun\x00', 0x1}, 0x18) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$PPPIOCDISCONN(r2, 0x7439) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64IPIN\x00', &(0x7f0000000180)='/selinux/status\x00', 0x10, 0x1) fchmod(r3, 0x81) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffb000/0x2000)=nil) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80802000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r4, 0x800, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x5c2, 0x0, 0x6}}}}, 0x30}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{0x0}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000340)={'team_slave_1\x00', {0x2, 0x4e23, @multicast1}}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[], 0x0) 20:35:30 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x3079146f81ad8a7d, 0x0) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) r1 = socket(0x8000000010, 0x3, 0x10) sendto(r1, &(0x7f0000000080)="120000001600e70d017b00000000008e1584", 0x2da, 0x800, 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x8001) [ 2324.143900] audit: type=1400 audit(1549744529.840:10561): avc: denied { map } for pid=12617 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:35:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x400, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/access\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8800, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() fchownat(r1, &(0x7f0000000080)='./file0\x00', r2, r3, 0x1500) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 2324.226738] audit: type=1400 audit(1549744529.850:10562): avc: denied { map } for pid=12617 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2324.332687] audit: type=1400 audit(1549744529.940:10563): avc: denied { create } for pid=12616 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2324.430407] audit: type=1400 audit(1549744529.940:10564): avc: denied { write } for pid=12616 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:35:30 executing program 5: r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$eventfd(r0, &(0x7f0000000040)=0x2, 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x0, 0x0}) [ 2324.490143] audit: type=1400 audit(1549744529.940:10565): avc: denied { map } for pid=12633 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:35:30 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='\f', 0x0) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="bf1770a3c0406ee9321470db336c4dac69d33f3199671a16e532ff20e79a48d0c0503a5d2554314b76b28ac0f4f2bb9f9c38a049c7101dabcbf4a91b97613e9e9b10bca385b4c96cb24f51f6aa264b7319c526927da06794521bce9bb97d3955aa1f5e165de008f5c5a058dd25097d10d3ecd4684d86a1a228a3c500bb6744be1f6b411ffea5798e065183955177dc941b58cce4d7e254023afc6a145d4c26e234df27c5c0560f8cbbdb84641db895414ec02d5cb5bdecfe", 0xb8}, {&(0x7f00000000c0)="48cc0cc20c34799b6109ae645cec0d87e61443c2e90e0634fd2e71f558a9ea9f696b7ff8c287f389ea07f83602557274dc6a7d6b", 0x34}, {&(0x7f0000000100)="5be1c917512c31455bfe22c435600d870be1ebf7cad5941d1e37b7e9081c85189fd37f4b645181211963debda3c03bbdb514ad487057", 0x36}], 0x3, 0x0) fallocate(r0, 0x0, 0x0, 0x6) lseek(r0, 0x0, 0x20000000004) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x2000, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000200)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r0, &(0x7f0000000240)='security.capability\x00', &(0x7f0000000340)=@v3={0x3000000, [{0x65, 0x1}, {0x100000001, 0x401}], r2}, 0x18, 0x1) arch_prctl$ARCH_GET_CPUID(0x1011) [ 2324.550319] audit: type=1400 audit(1549744529.950:10566): avc: denied { map } for pid=12633 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2324.612785] audit: type=1400 audit(1549744529.960:10567): avc: denied { read } for pid=12616 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:35:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000380)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000480)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000500)=0x14) accept(r3, &(0x7f0000000900)=@can={0x1d, 0x0}, &(0x7f0000000980)=0x80) getsockopt$inet6_mreq(r3, 0x29, 0x0, &(0x7f0000000e80)={@dev, 0x0}, &(0x7f0000000ec0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000f00)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000f40)={'bridge0\x00', 0x0}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x6c7, 0x10001}, @mss={0x2, 0x80000001}, @sack_perm, @window={0x3, 0x1e}, @sack_perm, @mss={0x2, 0x7f}, @timestamp], 0x7) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001080)=0xe8) getpeername$packet(r2, &(0x7f00000010c0)={0x11, 0x0, 0x0}, &(0x7f0000001100)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001140)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000001240)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000012c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001300)={0x0, @loopback, @empty}, &(0x7f0000001340)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001440)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000001540)=0xe8) getpeername$packet(r0, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000015c0)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001600)={@multicast1, @multicast2, 0x0}, &(0x7f0000001640)=0xc) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000001680)={@dev, 0x0}, &(0x7f00000016c0)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r5, &(0x7f0000001d80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001d40)={&(0x7f0000001700)=ANY=[@ANYBLOB="2c060000", @ANYRES16=r6, @ANYBLOB="100027bd7000fcdbdf250300000008000100", @ANYRES32=r7, @ANYBLOB="7001020038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400990e00003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000200000008000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000000010008000600", @ANYRES32=r10, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r11, @ANYBLOB="080007000000000008000100", @ANYRES32=r12, @ANYBLOB="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", @ANYRES32=r13, @ANYBLOB="3800010024000100616374697665706f000000000000000000000000000000000800030003000000080004000000000000000000", @ANYRES32=r14, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000500000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004003135000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="08000100", @ANYRES32=r16, @ANYBLOB="0802020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000000000008000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r18, @ANYBLOB="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", @ANYRES32=r19, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r20, @ANYBLOB="080007000000000008000100", @ANYRES32=r21, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r22, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x62c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000140)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0xff, 0x0, 0x0, 0xfffffffffffffffe}, 0x20) 20:35:30 executing program 3: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x18, 0x4, @thr={&(0x7f0000000000)="a71f2ba0ffbebf951230b3", &(0x7f0000000040)="c60aa826f66ee9e97f8a9cb521cfe2f35994ea1c714c0b4102568c36c1c5657846fb96757e81f62995a97cff9a01682d20cb77805177bf98d538d5869f584872dfd00675006ffa088f0d987e71c48a04f77f33e966c3adde6da7416655cd6302f3"}}, &(0x7f0000000100)=0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(r0, 0x1, &(0x7f0000000180)={{0x77359400}, {r1, r2+30000000}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000300)={@remote, @local, r4}, 0xc) syz_mount_image$vfat(&(0x7f0000000340)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x2, 0x4, &(0x7f00000006c0)=[{&(0x7f00000003c0)="298201a9418709dda86b9b1090a7d1ff1087d7d3e5a21a26a812b64e74eea53ca8c48857a083871cba65689a4014f0e7639cef73e63bbfb41a668cce1103a982161c79a4984916dd294430845c", 0x4d, 0x9dc}, {&(0x7f0000000440)="97524e10b63f387c26276f885988498d8bc005b71b4319ef7779015170f2cb246611ab99e07b95b4d198514caf491c1620a99aef9565e4435920d36e3fca1cfae07d101c6b894d633374a13ec4a8e8c903aaf672a36be4a554f8692cbd3f8af9f27e8962d1c5fafb971b242f5087af7f57ff23daca231427703717815ae3f764f05a81889793404cff216a82a0c8fca10d96eb62e99ac8e91e06807d7470fe9f7765fc844c2e83e081521df74dfcfa39866a10cae4026474e55bb18de2943852de71c68ad3c77aafed852826aa5230076ba7ca2b192c32916677667a9c05e9f4de8865aa937e1996", 0xe8, 0x401}, {&(0x7f0000000540)="43e14ba32330e874fed9cad19bf32c1ecb80260e5ca39f969dc3732ea8cdd2e6dec490930ecf786e6f4e75a4c58d1ec0f43a5e30c35bbd3b2c8fc238fd5a6ed8681fc8aacf5f0f98aaf42285a77b7a66a7125edb7efcdc816979de165ef5bcf99e3da52e9c3d5a0c953babe6ea9e56b3ec2a810f598db4884751fd16d9b0d6043380dfee0886bf600f6220c6c50530768094cc56cabe158f9d57e3f8db346f238830b95d1d32989572013b8815c96c9b1625f9fa670c8d7323fdffb15dd6c24c55d2a4c6b38351438346eee9e054fd6d2cec68d349676713cb548ad7", 0xdc, 0x3}, {&(0x7f0000000640)="875dde8d133c28c2b156071d082e26f9750b88b11e5b00cf80057af87eeef829b0077d637de278d393c4a082f84b29c2ece3a87e12f6ff820b59a4d0d48a6690b7b52da3b0", 0x45, 0xffffffff}], 0x1000, &(0x7f0000000740)={[{@numtail='nonumtail=0'}, {@iocharset={'iocharset', 0x3d, 'cp857'}}, {@fat=@debug='debug'}, {@rodir='rodir'}, {@uni_xlateno='uni_xlate=0'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '^eth0}cpuset'}}, {@euid_eq={'euid', 0x3d, r5}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfstransmute={'smackfstransmute'}}, {@audit='audit'}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@context={'context', 0x3d, 'staff_u'}}, {@subj_user={'subj_user', 0x3d, '&proc/\x94'}}, {@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, '-$$#system{@(^6'}}]}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='cpu.stat\x00', 0x0, 0x0) write$P9_RLOPEN(r6, &(0x7f0000000880)={0x18, 0xd, 0x1, {{0xc6, 0x2, 0x5}, 0x4}}, 0x18) ioctl$RTC_WIE_OFF(r6, 0x7010) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000000b80)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000b40)={&(0x7f0000000940)={0x1c4, r7, 0x300, 0x70bd28, 0x25dfdbfe, {}, [{{0x8, 0x1, r4}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9e}}}]}}, {{0x8, 0x1, r4}, {0x164, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x47}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}]}}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x40010}, 0x8001) setsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f0000000bc0)=0x10000, 0x4) ioctl$FIBMAP(r6, 0x1, &(0x7f0000000c00)=0x3) syz_genetlink_get_family_id$net_dm(&(0x7f0000000c40)='NET_DM\x00') r8 = open(&(0x7f0000000c80)='./file0\x00', 0x200000, 0x0) write$P9_RLERRORu(r8, &(0x7f0000000cc0)={0x14, 0x7, 0x1, {{0x7, 'staff_u'}, 0xffff}}, 0x14) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000d00)={0x9, 0x8, 0x7fffffff, 0x1, 0xfffffffffffffffd}, 0x14) syz_mount_image$f2fs(&(0x7f0000000d40)='f2fs\x00', &(0x7f0000000d80)='./file0\x00', 0x1, 0x7, &(0x7f00000011c0)=[{&(0x7f0000000dc0)="3d6ba13102c5d60b604051b0ba48de541b932bd9ed8a779fcb67c9b59e8ad21642f147311f39f8db852b82fb89c3a5258b6b53da71e9562cb86b582e4e5ac53fea726265df9c9737be7957509bf575f0a6e05cc13d99b9c7e8327582572d9a26f79b1a2a6881f7d11a59ddc7961dbeea759ae57a2c777bba88a9e3df818b4ed87fcf678bb4899c2001795844cb9a37e02fbe2600e7dec3b6bf01b9cb7607eba66b27", 0xa2, 0x620}, {&(0x7f0000000e80)="c0f5467d59d81674f65325a99db90b26e48eaf773e01eda5832a754d61885eb825b1953d31e118621ebf3b50e488081adc16c828abde4c5d87d8c26bf8c21f429aca489206fa0cc923112b6948d8", 0x4e, 0xfff}, {&(0x7f0000000f00)="9dbc8e978f623364828cbc5a61b72a9f46cd467156716d7702769eb9bd213225b4a2536a85005144196fddc629df83c7ffd588faa7f6f2933591ff5c05d188fb5991fdd0c7035796a5ddbc290c58ecbbca1eb86442156ef8161927a46d065ad4ecd1d1d8ae6d9fd14ef797ad3f1855168d70bfb6dfd0cff3b78d66aabc1163a3fb88f1c7d348626d67c298cefa5bc1697bc60dba023b2a529d62b5230f0eca034baf2615d7d14289665f220608d29d66306b7a6cf5b7b1c9e5480ae8e816aa43a10d085dbc967eb88b1b183caa546325bf8c76883e8832bda01e43eed96b9db6f1a420731bd7", 0xe6, 0x8}, {&(0x7f0000001000)="61c92f633290f8a8ef297f6b145a1598698602854153", 0x16, 0x1f}, {&(0x7f0000001040)="b97a6e9056e965bcae1fe3e3a7a482602c316a55791a04c677e36eb6599a26208051da74384dc446fe1ba9291f7f04ccd885db457da6827879b621c11cafed7a26dbfe1a57b61348cdc7794da5eb695e6778f91dbe90f4c3c482661fb35ef77cbf013133c2774970a415375470d9caaef0305f8636c7689a3c0b52cb7c7a338b3627643d14e4de1d803ea090bbc287d7b96dbe2749185e44797c937bee93d7a5caf06a8c40e569eefd0a47c5e194fa48fda3edc7ceb2624c874f95795f0206f55e82fb256f1888c3e665795e3a166af0bb79bbefda4829", 0xd7}, {&(0x7f0000001140)="55231e98929e9dd067d7331d9183cf01c8dd433ec14456194c4d5ab04a7840615bd76e717ffbf8d967fd6a79cb720823181116bb671314805eb31e", 0x3b, 0xff}, {&(0x7f0000001180)="4acc73385555abffec889270624e", 0xe, 0x5}], 0x2000, &(0x7f0000001280)={[], [{@measure='measure'}, {@fsname={'fsname', 0x3d, ',}x)wlan1posix_acl_access)#@)vmnet0[{\\eth0^cgroup'}}, {@subj_user={'subj_user', 0x3d, 'cp857'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x7f, 0x62, 0x39, 0x77, 0x39, 0x77, 0x37], 0x2d, [0x35, 0x79, 0x37, 0x37], 0x2d, [0x0, 0x37, 0x62, 0x31], 0x2d, [0x34, 0x0, 0x7f, 0x39], 0x2d, [0x77, 0x66, 0x37, 0x30, 0x77, 0x63, 0x7d, 0x31]}}}]}) setxattr(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)=@known='system.advise\x00', &(0x7f0000001380)='team\x00', 0x5, 0x1) r9 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000013c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$binfmt_elf64(r8, &(0x7f0000001400)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x5, 0x2, 0x6, 0xffff, 0x2, 0x3, 0x5, 0x362, 0x40, 0xc4, 0x4, 0x3, 0x38, 0x2, 0x80, 0x2, 0x4}, [{0x1, 0x1, 0x5, 0x9, 0xfffffffffffffffe, 0x2, 0x401, 0x5}], "9a257a32d8d6530c2ac3e7183ac54023c00728078c91f646dd5787cfa782612d93f14c6f8727326ac1daf043a028a54e6f22bfc73a52e3eb6bff3adb8c7f609aacd98ea3a8ab9fd20aa42c4f132c7da86630f811b1e429549c75dcc2b6b2e249ef3a878bdd3b05749ea872a412", [[], [], [], [], [], [], []]}, 0x7e5) stat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000001c00)='f2fs\x00', &(0x7f0000001c40)='./file0\x00', 0x1, 0x1, &(0x7f0000001cc0)=[{&(0x7f0000001c80)="1b3c2169bc6fc92294551dc67e580f7066", 0x11, 0x5}], 0x60000, &(0x7f0000001dc0)={[{@grpquota={'grpquota', 0x3d, ',*)systemGPL+/'}}, {@adaptive_mode='mode=adaptive'}, {@resgid={'resgid', 0x3d, r10}}, {@background_gc_off='background_gc=off'}, {@discard='discard'}, {@resuid={'resuid', 0x3d, r5}}, {@four_active_logs='active_logs=4'}, {@disable_ext_identify='disable_ext_identify'}], [{@obj_type={'obj_type', 0x3d, 'context'}}, {@dont_appraise='dont_appraise'}, {@obj_user={'obj_user'}}]}) ioctl$sock_TIOCINQ(r8, 0x541b, &(0x7f0000001ec0)) getpeername$inet(r3, &(0x7f0000001f00)={0x2, 0x0, @multicast1}, &(0x7f0000001f40)=0x10) ioctl$KDENABIO(r9, 0x4b36) setsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000001f80)={r4, @dev={0xac, 0x14, 0x14, 0x2a}, @local}, 0xc) removexattr(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)=@known='trusted.overlay.upper\x00') ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000002040)={'ip6tnl0\x00', r4}) [ 2324.710269] audit: type=1400 audit(1549744530.000:10568): avc: denied { map } for pid=12634 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:35:31 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000001af0fe576c5b00000000611048000000000095000000000000008da0df8a4669ebe1ec8519ed9d665cee673f535c5d991f591fa473f5f54a609ca0bcb773a24f479b1b27f11814"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:35:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f00000000c0)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x0, 0xa, 0x0, [], [{0x1, 0x80000000, 0x3, 0x2, 0xffff, 0x4}, {0x4, 0x0, 0x8, 0x4, 0x3, 0x4}], [[], [], [], [], [], [], [], [], [], []]}) connect$inet6(r1, 0x0, 0x0) 20:35:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2000, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e23, @rand_addr=0x6}}, 0x0, 0x7, 0x0, "20079ca6f4f5a10bdb043d173d0d5f00279de8b37dc22fd0f5dc06970fbf8f80ed4138081f8fea6488aaf879eb8ab9b51dcf318c36b227e564cf4abf711ce4727f0ced7ae971dfa1bfda34fd7872ec16"}, 0xd8) 20:35:37 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) accept$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000280)=0x1c) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x4) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d6000/0x1000)=nil) syz_genetlink_get_family_id$tipc2(0x0) r1 = accept$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000100)={0x9, 0x5, 0x10000, 0x7, 0x1, 0x1000}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) getsockname$packet(r1, 0x0, 0x0) r2 = creat(0x0, 0x10) ioctl$PPPIOCGDEBUG(r2, 0x80047441, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0xf9b754612877142e, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000000c0)=""/63) preadv(r3, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) sync() 20:35:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='ne\xd3;0\xc6\x0ex\x02\ator\x00') sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./bus\x00', &(0x7f00000003c0)='fuseblk\x00', 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x3) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f00000001c0)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='(\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="2300003720b27a000000000000000000"], 0x28}}, 0x0) r6 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) ftruncate(r6, 0x2007fff) fsetxattr$trusted_overlay_nlink(r1, 0x0, 0x0, 0x0, 0x0) write$P9_RXATTRCREATE(r6, &(0x7f0000000140)={0x383}, 0x7) sendfile(r3, r6, 0x0, 0x800000000024) creat(&(0x7f0000000340)='./file0\x00', 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/stat\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r8) openat(r7, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 20:35:37 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket(0xa, 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x0, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x9}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/policy\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f00000001c0)}, 0x10) ioctl$SNDRV_TIMER_IOCTL_STATUS(r3, 0x80605414, &(0x7f0000000380)=""/195) signalfd4(r0, &(0x7f0000000180)={0x4}, 0x8, 0x800) chown(&(0x7f0000000740)='./file0\x00', r2, 0x0) unshare(0x200) readlinkat(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/74, 0x4a) utime(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f0000000780)=""/4096, &(0x7f0000000340)=0x1000) 20:35:37 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="02042dbd7000fc000c000200080002004e200015080004004d00000014000100080005000000000008000900770000003000030414000600005a45efe7060000000000000000ffffffffffff08000500ac1414bb0801080600000000080007004e2100005d000407fd844378fd536307379e023b0057cc8d237c282918bf40128fdd6d3b9ac482627a4173f3d26080b3c8b5214ac76597d9a4d5c5f058fbaf5db704622f62cc1af932e0528eb34a90a84ac1c603a85d273d347ff41a975e64c21ed24b7c3f1596b3a3b5cf68f308b7a38dd4b1daf82a3b87278b21c0492bed58e01e7d4783050000004ca3b4c5fae4639ab635054f469722e95dada1f361a949d0ee460e313674d470024bb54db260eda4974fb622698c2fc2596bdaa96040ca178df4d5757fb1257c3001000000000000002ca33d107e770f50c11f8938e560522aa795b7c84cf2de19d16e42046de61e3775326e9ab668ac894a6598cd1b85c9e18cef07fd016f12c89e37719a5b39777f18a1634fa8772cee025e11d36fda12a3359a014e784ef0a0ca7c41feb23ac0926b953c9a4f9a7f77e64e49b083559a2e4f7014d036968a351fb5f8c3abb2c2db422c041c5533518615a07413afe59cdf2d55da68"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:35:37 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) r2 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f00000001c0)='system_u:object_r:semanage_trans_lock_t:s0\n', 0xfffffffffffffffd) signalfd(r1, &(0x7f0000000200)={0x7fffffff}, 0x8) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="375fd111244c9b52c4d033c2a1d4bf9c18da4f87affea905cda2ad9f875afb78609c34f5732139fa74184e44c0556ace15db4e8965", 0x35, r2) accept$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000280)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000002c0)={@rand_addr="50c64b017e9d1e36bdf2489769ba5f24", r3}, 0x14) keyctl$get_security(0x11, r2, &(0x7f00000003c0)=""/152, 0x98) [ 2331.994026] kauditd_printk_skb: 101 callbacks suppressed [ 2331.994035] audit: type=1400 audit(1549744537.900:10670): avc: denied { create } for pid=12731 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:35:38 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, &(0x7f0000005fc0)) accept$packet(0xffffffffffffffff, 0x0, 0x0) accept4$packet(r3, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f000000d380)) write(r3, &(0x7f00000001c0), 0xffffffea) ioctl$BLKIOMIN(r3, 0x1278, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 2332.078964] audit: type=1400 audit(1549744537.900:10671): avc: denied { write } for pid=12731 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2332.106513] audit: type=1400 audit(1549744537.900:10672): avc: denied { map } for pid=12739 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:35:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x3, 0xcc, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x800, 0x4, 0x100, 0x1, r0, 0xe696}, 0xfffffffffffffeeb) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) [ 2332.132766] audit: type=1400 audit(1549744537.900:10673): avc: denied { read } for pid=12731 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:35:38 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) accept$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000280)=0x1c) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x4) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d6000/0x1000)=nil) syz_genetlink_get_family_id$tipc2(0x0) r1 = accept$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000100)={0x9, 0x5, 0x10000, 0x7, 0x1, 0x1000}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) getsockname$packet(r1, 0x0, 0x0) r2 = creat(0x0, 0x10) ioctl$PPPIOCGDEBUG(r2, 0x80047441, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0xf9b754612877142e, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000000c0)=""/63) preadv(r3, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) sync() [ 2332.252761] audit: type=1400 audit(1549744537.950:10674): avc: denied { map_create } for pid=12730 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:35:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x408103, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0xd) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffffffffffff80, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000002100050c00000000000000000a001400000000f80084837e9318000000090000000800170000000000510d02000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 2332.286155] audit: type=1400 audit(1549744537.950:10675): avc: denied { map_read map_write } for pid=12730 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2332.355371] audit: type=1400 audit(1549744537.950:10676): avc: denied { map_read map_write } for pid=12730 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:35:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000100), 0x1c) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x14) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() recvfrom$inet6(r2, 0x0, 0x0, 0x2, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r4, 0x200, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) tkill(r3, 0x3c) fcntl$setstatus(r2, 0x4, 0xc2803) [ 2332.449224] audit: type=1400 audit(1549744537.960:10677): avc: denied { map } for pid=12744 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:35:38 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000001c0)) r1 = dup3(r0, r0, 0x80000) r2 = openat$cgroup_subtree(r1, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000300)=0x3f, 0x4) signalfd4(r2, &(0x7f0000000040)={0x7fffffff}, 0x8, 0x80000) r3 = openat$cgroup_ro(r1, &(0x7f0000000340)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bind(r0, &(0x7f0000000140)=@in={0x2, 0x4e20}, 0xcd) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x18004e20}, 0x10) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000200)=""/78) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000)=0x7, 0x4) mknodat(r3, &(0x7f0000000080)='./file0\x00', 0x40, 0x7) recvmmsg(r0, &(0x7f0000000180), 0x400000000000370, 0x0, &(0x7f0000000100)={0x77359400}) [ 2332.512600] audit: type=1400 audit(1549744537.960:10678): avc: denied { map } for pid=12744 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2332.602777] audit: type=1400 audit(1549744537.970:10679): avc: denied { create } for pid=12734 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:35:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0xfffffffffffffea1) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) [ 2333.117337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12786 comm=syz-executor.0 20:35:39 executing program 5: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x118, 0x3d, 0x8, 0x70bd2c, 0x25dfdbff, {0x6}, [@generic="9a3e61bf4455fbc9f45af0bc4b1df6d246cf97b902ab82d64cf713713705e087c4d571c6a3c8c4808760dc31d31a2c594b1c63da3f45ba7cc4fcb898b94f6bc468cc7e3ad189aaec58b515837d5b6dc5a1933b8e0c5be3496cb2031cf2bf1bab7bc30943ea92e252093194184c418fa5cd6c3d684734792eb490d7afc18e7eaa37bb2f31ab2b2cf79dcbc31570cf", @generic="a067037b79ab5e09506b3c9fde4344d77e784c298e8f418f7fde96c06d21a826910e60d3e1791244ad9ef2d911bf3df145419a19d260b084d4d4dde89a91fbb16e2b4239743c8a567dfdbb5bf0b9ea529734abe92ea907b101169667b846a537d474e814600449e595997c8e326edfcf16d679"]}, 0x118}, 0x1, 0x0, 0x0, 0x40}, 0x800) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fchdir(r2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x94, r3, 0xa21, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x400}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1f}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7ea}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8001}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000804}, 0x20000880) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000440)=""/174, 0xae}, {&(0x7f0000000500)=""/225, 0xe1}, {&(0x7f0000000600)=""/85, 0x55}], 0x3, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000006c0)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000700)={0x6, 0x3, 0x8, 0x0, 0xf}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getpeername(r2, &(0x7f0000000800)=@nfc, &(0x7f0000000880)=0x80) accept4$unix(r1, 0x0, &(0x7f00000008c0), 0x80800) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000900)) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000a00)) ioctl$TCFLSH(r0, 0x540b, 0x6) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000a40)=0x10000) close(r0) dup2(r1, r1) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000a80)=0x3) accept4$unix(r1, &(0x7f0000000ac0), &(0x7f0000000b40)=0x6e, 0x80000) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000d40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000d00)={&(0x7f0000000bc0)={0x120, r3, 0x2, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfffffffffffffc9e}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x900f}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x19}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @loopback}}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffaef}]}, 0x120}}, 0x10) write$selinux_create(r0, &(0x7f0000000d80)=@access={'system_u:object_r:getty_var_run_t:s0', 0x20, '/usr/sbin/cups-browsed', 0x20, 0xffff}, 0x51) futex(&(0x7f0000000e00)=0x1, 0x8f, 0x2, &(0x7f0000000e40)={0x0, 0x1c9c380}, &(0x7f0000000e80), 0x2) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000ec0)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000f00)='/selinux/enforce\x00', 0x0, 0x0) time(&(0x7f0000000f40)) [ 2333.367258] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12802 comm=syz-executor.0 20:35:39 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) sendmsg$nl_generic(r0, &(0x7f0000001380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2010418}, 0xc, &(0x7f0000001340)={&(0x7f0000000180)={0x11a0, 0x32, 0x212, 0x70bd2a, 0x25dfdbfe, {0x6}, [@generic="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", @nested={0x18c, 0x43, [@generic="08142b4c2730510ca1668ba178a5b15b6f06384c9746852a35b4b4c9ed46a3ad573317118f6ada81c2228d29d4b9004a9f824239ee2af5cdf1cc6817fec3052b6dbd5b4e0ebf42f0ecbd8be7dba275bffd6df96d6ee61fa8ed01712428b49ef36aa9a3a3b8a36405214558b52f819ee18a1864d21bb9a2948a57cf2fae7ca21947ff78c111981714e0d4b27882c3e6f7f83836", @generic="9854385f3c6a52c76858a938e88229ccfa3febdff73088a461337134ebce35d26d3265f36e3243c85b0c47a51825", @generic="eac1bfde2f59be2b58ba6791b58d2694d3491dde2bc147d1707fe3a4813404a54336a952ea884682a92e24b27b1fb28142b0d624c1dd4211c8d67a892203ae894c2fc3e2f10e4bdfad5cc5bcec3348", @typed={0xc, 0x20, @u64=0x3}, @typed={0x8, 0x67, @u32=0x95}, @generic="45e73137b1018e40f3a1dda84fe86c8b0d2b40652056552fea2d9d0dac820b1b6c3d2ce5ef9a7ce6ecad8dbe58173e16b2b2e6c2efb1891c438ce0278a30fc587ab93c3ea1213b9653274ea1debe56bcdde00cf0576da4de657c3a9d549bdf7c83"]}]}, 0x11a0}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x29, 0xfffffffffffffffb, 0x0, &(0x7f0000000040)) ioctl$sock_netdev_private(r1, 0x89f0, &(0x7f0000000080)="aef7c8491b2186ccf6a21c5583db099c5b1a8b46097ad4c91598d4403844bae61dff546cd4c2bc4c4dc6f724c4cc82aa22bf4ec55c45a6da05a2c0bbb4611ddf4949a425af0d2d57817f759fb86ed946a4163ed9895079eb67ed49d7d26e1201780ea557f209d240fdfec6a7defc63176d9ac499c20e0798246032190a92114ab4682140d65c323ff647c86773a99e2246475afb90bd2bc1f39428da435815f84166104dc7410cdf6d67af3ab17d6c8737e6") 20:35:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f00000021c0)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, 0x0}}], 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x16, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) 20:35:45 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="080007000000000040000100240001006c625f68616a785f737461747300000000000000000000000000000000000000080003000b00000008000400880600000800070000000000e4080013d6294e9f20a8e4a5fc3905a8e0f3a27c844f337a28328687ed809590422b35f676769e83271f054b56cef851b5c717fd668ac7a7433aadfb85788c64067fdb94dc570173a35f89e5078b4518334c88fccd36ae0f7d285f649db6802b0751d8781fcb58316a270e003f682083eaedbd685c0850b885cb2e105e8446f209f66569c9033f552e75a5fa27a150e50de7805a19de60ebbc4c5774afcd02e5a34862775965f6f4062622d32e801e6238e87a7087a801000000000000007fb279d4563da0533abf489d3c23cf9ad5f033d3e1e96b80f9f306efaa94e62107c26747531f34dd93fe1608b69ca25c744bbd7df31f5c7dfbb97163fda5d861bd81bb11399f66fb12a2da387a03f8dd33bee7cba7f724b16a5bcc48af8c23922cc1f5980a28dbe0297d0fe1fca55c6f70ed7fe074834596dbf62d19d7c903fa8fbb0969184af2542110293b580e756ec016a413d34d22d9dd36e5ec9fa29a2d8b34125bd435d5b762d963dd8a9f2136f2f937184b5229d72ba13655e29dc86391cc1489d2f176f80c7b8773824202e3e54c925cde75d638700ad40980e4b586c94fd1a354748241269d023ee23759b0b2dbf4e342200eb2bfab878ddebaf137a400979fac78e1d1443b806800000000b8bf7ccaacb724b1b2ddd74e6c75516efe74e189fef59fb06e900d721fded45458ef0e0aaa1814a2858bb36c4832a7520792ee4bca334528baf9003700000000000000f67f0276a139d423d5464bfa47fe0932bce55f6408dfaf5c295c50819549ff363a4b649bb8d55d8fe41ae9576caf7a32f14583eba73d3b9019bbd6cb1b4f5647cff6be2a2900000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:35:45 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000040)='\x8b)\xa9I\x0e\xd7K\xfd\x97nT\xde\xc6\xb2\x98D\x9f\t\xe8\xb7\xc0O$\xfa\x1e\xbaO\xda\x0ed@M\xe0\b\xb8aJ\x15\xfc\xa5\x89\xdf\xbcc<\xb1\xedKge+\xc7\x17h,RFZ\xfb\xbd^Z<\x8eN\xac\x04\a\xc7\xc0\xd3\xd9\x1e\x88~\\\xef\x85kW\xbb\xc2\x11\xe57b\x014\xb1I\x1c\xe7q6\x93\xf3u\xd4&\xb7\x0f[\x93\xd2|l)\x7f\x1c\x0f\x1b\xdcd\xa5\xdf\ni\xceb\xdfE\x1d\xee^\x14\x16\xb6\xfb:=$u.\x80\xc5\'\x01\x89i4\x19\xb2\xc4]\xd1\xd9\x86E,\xc3=N\xb8>N\x1e\x06\xf0\x06\x89\xa0l\xea\x9f\xf5\xa3\xf1(W\xb8\xc4$\xc9#\xac\x82\xddv\xa8\xeen\xd5\x9c6C\xd3\xf6\x98\x1a\x1a\x00\xfa\xb6\x1b\x93\xb3\xf7\xe9{495\xbf\xff\x95ai\x02\xa7u<1\xc8\xcf\b\x1e>\v%\xde\xef\x9c0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000040)=r1) 20:35:45 executing program 2: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) r1 = dup(r0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000001c0)={'broute\x00', 0x0, 0x4, 0xaa, [], 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000240)=""/170}, &(0x7f0000000180)=0x78) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2340.057988] kauditd_printk_skb: 63 callbacks suppressed [ 2340.057997] audit: type=1400 audit(1549744545.960:10743): avc: denied { create } for pid=12834 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 20:35:46 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x35b) 20:35:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x2f, &(0x7f0000000000)=""/168, &(0x7f00000000c0)=0xa8) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000140)) socketpair$unix(0x1, 0x4005, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syncfs(r0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000100)) [ 2340.103596] audit: type=1400 audit(1549744545.960:10744): avc: denied { map } for pid=12844 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2340.128166] audit: type=1400 audit(1549744546.000:10745): avc: denied { create } for pid=12834 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 20:35:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x4) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, &(0x7f0000001600)) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002e00), 0x386, 0x22, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000040)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) [ 2340.158991] audit: type=1400 audit(1549744546.010:10746): avc: denied { write } for pid=12834 comm="syz-executor.5" path="socket:[203384]" dev="sockfs" ino=203384 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 2340.191994] audit: type=1400 audit(1549744546.070:10747): avc: denied { create } for pid=12843 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:35:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x80000001, 0xfffffffffffffffa, 0x8000}) writev(r0, &(0x7f00007af000)=[{&(0x7f0000000100)="480000001400190820ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a01009164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) [ 2340.287788] audit: type=1400 audit(1549744546.070:10748): avc: denied { write } for pid=12843 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2340.345505] audit: type=1400 audit(1549744546.100:10749): avc: denied { map } for pid=12849 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:35:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x2, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000140)={0x5, 0x3, 0x1, 0x5}, 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) bind$inet(r0, &(0x7f0000dc7ff0)={0x2, 0x0, @local}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udp\x00*^\xdf\xb1\xe2\xfe\xe8b\xac\x96\x88rM\xc3,\x95f;\x95\xba\x92\xb1Z\xeay\xf4\xeah\xc1\xe0\xc0\xd39?\x1er8l\x8a\x1e\x8e\\{\xa5f\xb6=\xf5\bZ\xe62\xe10M{\xaatN\b`0xffffffffffffffff}) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_timeval(r7, 0x1, 0x15, &(0x7f0000000000), 0x10) [ 2340.514322] audit: type=1400 audit(1549744546.190:10751): avc: denied { read } for pid=12843 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2340.575227] audit: type=1400 audit(1549744546.250:10752): avc: denied { map } for pid=12864 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:35:53 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) fchmod(0xffffffffffffffff, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r5}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:35:53 executing program 5: epoll_create1(0x80004) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 20:35:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) ptrace$poke(0x5, r3, &(0x7f0000000240), 0x17) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) madvise(&(0x7f0000632000/0x4000)=nil, 0x4000, 0x0) keyctl$session_to_parent(0x12) listen(r0, 0x7f) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) poll(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) shutdown(r4, 0x1) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000140)='nr0\x00') r5 = accept4(r0, 0x0, 0x0, 0x80002) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) bind$inet6(r5, &(0x7f00000001c0)={0xa, 0x4e22, 0x2, @local, 0x4}, 0x1c) 20:35:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x84000, 0x0) 20:35:53 executing program 0: socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$tun(r2, &(0x7f0000000140)={@void, @void, @eth={@random="f65bbf7ff30f", @random="228dff195078", [{[], {0x8100, 0x7, 0x8001, 0x2}}], {@generic={0x6, "1b7e1aa33d194adf5c0e14bec3d0707a799a9f8df8b6e0fe86b768a6bd6bba281acd1d0caeba055090ec8e5a2762ba4b07b44b868b9f217f50cb681a193a5ad24bdf3819ceee1bdbe838fe58e934dcd418bdd3c9cd5d944bd855f2e6da559f9c684c6667b0af3655377476a3f2b7f40a7e1b9c4766125b218635d669889009b324aeaa4924ee1a73cf4c23d788ab14ded068"}}}}, 0xa4) mkdir(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f0000000280)='./file0\x00', 0x2) readv(r1, &(0x7f0000000340)=[{&(0x7f0000000400)=""/224, 0xe0}], 0x1) 20:35:53 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000010000000000000000000000000000000000000080d425660c747c21942e11ccdaeeb5192668b6183942ed63df727b8806"], 0x119) r1 = socket$inet(0x2, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000040)=0x1e) write$UHID_INPUT2(r0, &(0x7f0000001580)=ANY=[@ANYBLOB="0c0000000010e0d3c40ade4a5e6a89a9972e17981895cbe47595b7913fba672f7ac518e63b99d4847115a2175fa96181b62dc36c36ef1f38419e1ec041ef44f180d06a5e45a8cd694f8fbf2772140938f75586a7fe53a4da37bd17bf9f4ee3fb24c03e24aa1c991489f3e59ef23f3471e8bb604af7f0528b8c87ef0db9346367bd61026f26957ea423d01ca8ea9fa2a4929784ea5425cbe8167ebca1df0fd7072bc4133937db22ac17ca05ec457e6b1df21b3743ddfb4d79d67c1106eb34a5e6c8b15386fbfa49e6300f02bf94802846f09853c676140b6395234305330cdde4d81ae2fb99c496837d9eb484fa2b05775f589c262ac973b1d10716aee6077654930f7eb6c7bed9ed5baeeb610621640243cacd57dbaa44763bb0b59cd8bd312fdc1a566c3260303d082cd1d36cfa5d41d72361a14413c9fdac1a4735845880a05a51aaa1668b21e38e779b746493d1871c1a56354efc0fa745a4c8f04190d9a5296f38a8587580bbf565973eabac77e287c9bc8e387ddff5f89240036b524fee5919307a045429047c8c5afb52ee40ed6af7aa36bc8e2e54711c2af0e0b17779a030da1c385fda904b66cff6162042cd65c31d4d30dd5d19272dd1b75db90657dcbed3634221666e523b9ffaee5aef22dcb95a87baa474647804e17fa5f3cd2e11968d2a77d02842856a37e4b95a6f3692d52e16812faa5342c132cc67ef09b36a70b7b8a131978870eb4e56e4e3e7a578341f87c09e44194ba409e8b09631c9854ec772b9f15ca595af930bd79b2565127361e33333db7b6a2911b3e34d0341799dc225dd734f6295fb1846ebbd2c3cec1c71e272b8303fface1920bdb46414d593e764bb2fd0d3b224ee265bcb3971d44008503e2359f551acf7d7f812dcf2a7a0b0f8280d01510a9baaa0adccd4061b1d85666a248c6aa39b4d9bea97dfc1bed456efde8af87ee430439c04eae96ecf27d8d970dc3a124d62266e44f91c678ea4e8c76ac9f1e60c0dccc4f6922bef123d08cb5395acf2f64149582f52c1ac84de28801d3949983494adcc1e48985fc69680e15042b83ec1420c17f391629bfaa50e66f2a4dcc21e47ae784ad30dfbcea2b494b3efaa6d0581f2398b89c9b056ccba1b820a8575294d649e69d9dd2262d9143e86c455f2c8d9b5c717b57ffe7ff56efba7cab758191ead0bdee9c4639a16c4ecef51242169abaaff4d6111c04c6ad239a04ba68beee530204221b7a8dfa3eac20f00a50b8468c0c6e48cfa168b2aac3bb06e606222228064d15654b3150841f50bf10bae6b51d12ff92d6d2f58c5beecf28c071be23e10b22fbc1efcdb1509a5ecee323e22ac21852cde8f12de07cf304ef0972f77e5a0d21bbcdba4314a32214549bfe9794d1038174680850843b80d207c99297f503d9b466f402ba42e15e50e4c8ebab45e858e7d95c13990a0b3b9412ad203a590382238365fc75f18f33f434fbd03f0f0fe0b31512aeab9a205f7b5195efda9a47ce0947aaba569b15375bff66efd7a0bcc09913708efb8ef048b0eae07db5c00bd6f2186eb12d3ad0bf02a521ef9194beb15fbe79c2fd451ce651e86da950db8028ee2350689f46bf293d8e564f12ff8cee1b773eb3df7a715a3b46ca53bba1873986109f10d8aed0de06e8ce9cb8b34d564b1d597ce51d72d1f685b53a0aa8497bcec256a594bc9a831a422cb01eafb5fcd6794d0f490c27ac5d4bcc1e56210d37c50664f6453e7570e53a8e6e9dc6fbc99e5f7ae8344e1435a2e479bc98523eebd04eb4d9ba28eaa2332ace73cc5cceb27332630fe00fa1ef47007ca72ebf7fa897867049060687923957b3c1f66cbff7d1b549ded6b47e05e093436ca10bdb4f59e5d403d27c26d588c620b543ff2fdab3256272f84923171ae098fa29227d7eb512a96ce8539d154cdc6edc81d6817b1008321e6b7e213fd9406153c41c7c335e808e26bd188e58254c8f3df1600f28d17ace55d55af87749d5d5b8e3e949638ba95964d160be59c68095e6e1570df8a4de1077002f8e8b5aa26e503e9393fb44d763832e415c41d718d7dbd4b5483e51dfde5b7c41e03497c4aadbae71a1ca1ef1e3db0977b8489c67ac8464d23d7b7084a7cdb8e0023087cb40b090b5cd38eef39abc48b86d64e4c39f5061b5652e7eb721aa561617a9caf39c8ca7bd57f1be351220c140a9f0be2a345ec1f0c7d2768087ae2973099c8142dabb404069d1a39f7f8cf389e6925a8c91eaf1820f5cb3c1ee24980e0d08ed5258c8aa47c8e43137282cb5e9a7840bd3dc4430117b655811363276f39f3127fa0ca9259568b4fe85f4b80feab22574d520a052c40d3f58713f29c0dd67f9b9bb2c59c8493e18608c3514f0ea925466b0c5bd5990b9d286fc2844f3d1a97f44b6fe4bb6ed3df011139f3db1e0ee81207c81fff4ed54e3b9beaa50c83b37ae2a34b228a754ee2651a2487da23b7b1dc2ee13cddb3b6fbd315da5b3457ad1f39f56bb5825ec0bb39c0f95707c89ce09295667f973de1c184638708fc9cb9a53faa9fda9f8bb3123f0d55cc666f09921ebe7b3bb2c6daa2e7b0b445b3ce8ecf74c7a488a7fdf289ce8eb76ccdcaef3eec71fb168724c19f8212e77a3db07bf9976d4393a3d306defab689ba85d72b03023bbc62515790a4c1694c7182c67c8ee84787afb03bfca12ebc86a3c390e85d888ebcc0305e59d3a7a4864db7c8df092b8b841c1ac2e1357152c7501a5f7b2f0bfea707048e813e13dc2ff2d6e2401bd450faafeefd70f7ef5206910a890e6f65bb383802248684e084331fabbd320c7d191c0561c7120a36437e5576946935cfab962b398a67dbf9110082dd8aaa2c4f3a8a6f7b7149efb668ab28723f3d49874254dacaf33e4b091ac86a5a00b0528ab87a6969d07d950ffa9bb9ec1161d617cc275c25f30e99303df30d918472530e696c3622cde27c9106ed65dd2e531895ee8fead5cad5a991180a93fbcdedf8bba07c0421e4f74f8ebcbdac06c387ca45d1624aaff926eeca6cd12e1ce651c7b33b0386de26d7ac87128c58868c6687708c8d74cebdb823093736693bf329b171b53a70c537fb740c9e9d5585553104b2f5aa34353bb7ac72903511d1fb2f0904318a31ab811cc55a865efa50705a80d811143eb006b3c57903b52e00437c20ee0585cb9159afd66d3fd0b41e56df8959cf242232a19b089149361b634d1405d0827033afcc6bede3bd634f9087aff0975b956008860f715e78ecfa658cd73294f7270f489ed23f5c420ea38968e9c35953d879b83e1fb831f9a0a83ca08b437a62efb2d273d674b455c4cd3048364e82f0a64ae9d9c8b5916c6121bc8a4d8c0e01a3124995860e6a8b70125c98ad7f8d2220144103a57cb215c4b948c069c675e5ab02d5620c66fb2039379d257870852e77b64cb9c9be5c3c583f26155cda4f15143471c14686b1c1a404332b3216226ccbc19486d77e86f419da06014fc972f5884d073b4abae8fcff3144c194db893c25de2fa6f8e1c0cdff43c860c0c479aca8e282ffa779bee8a104afabc5b529ea2c567af38d877dfd600b15ddeb3ee513d60c5b599a517ade7d2003788975c2310b7fca12af3a31d1a28341920a845d797effc46509f78373fc3cedcd2f2a34ce22b2c49062b961bb7466dd76583941cb4956fbaf4f173da6d55bef118e283d394fd086b4d7a258da7485880c6021bc32c87f1d3c95d361fad3d4cf62db6e0587e1902933f6ca120dea3837078b89e4be99b4764ecfb1caa99780939c42d1f6e4fc3da3ee2dcabc107987daf2649a832f355bc449a1356d7a2df2c8dffee9ff466bd89fbc55a0d12023edb79e70eda68cd6653a44a0209d8dcc959ad44037472e29e41e352a66a03ac4b26d4848730260e8adf0bbff7f6d26546fcf55d58f8131d0b11ab868e26de89912b9e91c8aec255e39f5184813ddae021300bf11217a9dc0499d906b6c4caae881528ea935f7dff76506290d00ab8c517b9456d0bb8b113ff7027a93093bff94eb427299c083e4a490f29444800f4145cd3501998adadcd3dba032cab26451aba6dd60443ef5a827338dea04682907cb0ce11e6c68a7cba427f70a36fa60382c68ccf772240cd8c73ed237d77f33fbd0448c0f8144c70477caae16f60c5156ed11e2824e1445cc59b09268bc5d13f25efb77803c4d734ce4c6c7266b5ec0bb063cf46cf2487f8655d66310ceb1387fa0b010d7b2b2f04c08897bfefde8e00654417a45d7159a54942504576dc88c19aa4ae0e4fe952ccb1f44e949fb2694ca01a484e38a4751c8b88273bebd9b0ea0febb7f85abb011c3a3e52d0ff24e152c787408880c195c954f2345e74b53694bdb2c43e76932721cbd260cff0aceceaacf1adc551a496733f4c1f6a9f452f2dc0343960728c3abb03a1f837f1cc27d704c5aab21407f9eb1e92f343a844591e172af1e67d5076f0028f2463d253639cc8b0c9eeca3cae225cb698d0102b96e5c751936fb21a7f22f8a8bce35f0383ba761aebbe549c210105a7279fe2d33b227b2dc2371ab8b4d949ce0656a0a14378777e707d7a1f9803ccb02025cfacc589390d59ecfdbf8cf60167f095adbe0be23b8d8b89b60977189017fd74bafc8927886e8ddbc16cdfa96913713322229d805a0843c457e82c46126e48e8b7f69a0c2bcca8382cd8a8ebca0583ec85e8ebc318eb65af072513de729dd29cd2f8fdce1c1124948bf544786796e596f4eec8e2dfe49758b5a6b935acaaee20c7e77f523199e70b1e59c7b38e40f7a5e8c613b8cefbd2db29214e809e93037cc92f97080834d19bd42bb1c5efa86c09fa7d0ef7963c43dc89dcde667662f1b533dd0c28b471f626fa72edc211ccde3210b3db80348b78ccfbca58b97bf7d2013b50079807596af5470239ee4ebfaa544b192855ecd903c68afa03475c72aca69d2341b03945906734048c52563c30d38575b0585fc5ccc11f4e8d0979ee9b6e1da0edc8f6745e839e0289be853b095ce57011f808a696a2cd05b9a534624a0cf8f351c370018057993f2cfa927ed0af9e93f24a7feb13775cb4d11e39204680d79970e5ce29e8e0da2639e4570a5dc27b6109631223c58205e5aa8dcac7ec6c637db053977df2d73218637b39fb3f7dd321342f6c79e82fbf8366534ba57ce37f99a013a486e42d863a3d88bef163f291aa826e8f48cd525d79f506b82406e0bf3111ccaa6a6aca7fb0fe9a38d732f25210b7b92a524757db90f61d0e31377d773fe19bc47debfb4926755c6b743fc3cd53371c6da21b7f0d30ed58713203529894274f70decf7126f1fa05d670e67f0a00c00a70f3345a93e236e908ef0c50ff1c6b87b9f3257eeb8e7185b226d1ea71a15b53d3d232a31fcf038f55bcdaec3010a28d15cadda15b81ef03733ac8faae4c7bd941e08f0a672132e9bab2a4a05c642d3b47c9c81126d9bad28629c5e43ee37bac7359a3aeea514ec9fc447f08cef48881d1900f86fee58f03a13bfb1e8f010e0a6beb424acf6e5e85d972e3f7646d3d5ffc04a214f8586f2058cf9202dc6b6cc98f0a35eb52aa08b026918e36eb9f789e7fb3ed5957a1f26cad9dbafbcf7823e1b131b3206128f69b3516f7fae9d162f953116d55a1a354746df5d710339af8a0979749052c97b713ef6ee0f8f3546b4f513f3defaabf06cd00ed3c0dcfa78bcd8bc4bb494df5586078d8261a4c0629748c672a2ecd71a458b5e7111d14daac900322b021393447ed8d84380d4a894962ad4ed789a559ad524f000115f568668f66199158ab5e078c704dc3d025d91c60125e5f8fe0bb3228c4a20f7b221efd900000000"], 0x1006) [ 2347.570510] kauditd_printk_skb: 12 callbacks suppressed [ 2347.570519] audit: type=1400 audit(1549744553.470:10765): avc: denied { map } for pid=12895 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.571873] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2347.582317] audit: type=1400 audit(1549744553.470:10766): avc: denied { map } for pid=12895 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.620164] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2347.638730] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2347.668281] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2347.672157] audit: type=1400 audit(1549744553.510:10767): avc: denied { map } for pid=12895 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.691827] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 20:35:53 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000001c0)) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="9766732c00c91e1308b1d643da61a545ad68acc14e9d9829e79cc60e8d0980"]) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000200)=0x8000) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000040)=0x81) [ 2347.732856] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2347.738522] audit: type=1400 audit(1549744553.520:10768): avc: denied { map } for pid=12903 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.750173] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2347.762639] audit: type=1400 audit(1549744553.560:10769): avc: denied { map } for pid=12900 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.779956] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2347.794765] audit: type=1400 audit(1549744553.560:10770): avc: denied { map } for pid=12900 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.802554] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2347.829842] audit: type=1400 audit(1549744553.560:10771): avc: denied { map } for pid=12900 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.830712] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2347.864937] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2347.886207] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz1 [ 2347.923758] audit: type=1400 audit(1549744553.570:10772): avc: denied { map } for pid=12906 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2347.959403] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 20:35:53 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000100)={'filter\x00'}, &(0x7f00000001c0)=0x78) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@buf={0x1000, &(0x7f0000000340)="ef497bfe8200f2f7d78bd742590f07c165a8019e96c8a95d83ebd408f3d73d80d91c99f61c6bc4688475dc1ff691090f53b785d8e340d0a298c55249855e0bf170a915282eaf9788a9b618a91db96db2f537de73a78d5b6710e32251912f5dcd7a9a844093e28eff9a1bd548d0a40b7ca5eab0ba1f4a431858aa3a08e3fff53f2309c81835663239221e1f3961a581d9d5d54764c86a1b8f06bff93f9e9270fb640cd4c37165aff401b57993165a4b46b36a0fd2d16d55206fd790320c5f8897d49ba236f4dcfd94db30d19f2c687d372a9e7946a71a107846dccdcaa21991a37aae0e71d5e80d55ef6fbe3f71c725971501f02d603bfc987bb27df2d15f3e977726025ba61c04d1344410dbe114cd3dff8ca9aeebf8e0252a679320fe92aa51e535193445657d89b3dfe0a8f6e5b5af35d0d27dca6c35a3850358384dd8d7ca8337c95250582ccdeacc508520197a5da3cb44a01587ecea7930479a9c8a90790137ae319b09fd51f8a976968c535711102944271db6b7b465a78f526a65d21c4880d965d446b2fa3192ec276cc37270c7291b8e0729184ce0d7a013b9c34b41169696d1ab95f9e11734c3ff1f165974d7a20f32543867d5dafab3854638e69566ab1c30c1ab77f91379b955086993d0aa395e6119444c145302cd45d59155c2abf7b15aa86ce2db592a38bf99d6dd37b9fec4022027c0006ee8e6bd8aac47e500827de743f85d3625cf0e770ec0d51f3ca15233a3c10e2606c83ab7af7a68c90a79074854b416f32edc3ed6fb5f37f0ff4de1db82e2fd943f322bfeed76b7cbc0ace7e17d1f3cd39338422cfa4c553524fc20517ee58b3ebd3c546b2616c669a61ec9c6a0087ec3755073a1a9a44bf52102d644f94467813dccb2696dcad3302ea91f6193e21f3c2942c786e4737426d4cd59bca6a4e84bbf83db718577b5e219dd51493e9fb1c103f980becc26764078f40a3d5f07fd09c43986542e7de4d30f5be2a314e33801f0af42842952b48b7f16653b7a05c3cfa34d829d55fea8b6d9725294c84b7d6f32723b2feb566a2a98f35c79c4c4fbe99b5269d75109d142448ec13668d01bc1b5e87bfc17d6f2fb4f0f544f559918cd0db6021bd79658a9badfd74710a156ea57d767671f2cb1936784bfaf63652c5dd0fba7e0f08d03b29e0dbeb7c48f37ed04fd719dc6120dcdccb0da481c7ab7b786112b138b39e3cc5c2758c66e83b6bf83ce17367ff453c6f54fccb4be802da92b0970713354f5312a3b361baa77ce1a601d74a94f227909010027e9cec885a53f817a145ebc3df75e9d1fa914d272d3180f09fb8b00d558ae5d7d67d12a8a2af24a931d495c9f77782626a5475c59f5b33acf12a7868ff4fc5482005acc979ea88002ade9fb6ffc0b597c3a822dfff4619074ee61c76f70dff5015abde0985e46d386f5f2369780c02ec5070fbda5131d5e5189edab7ea8e454c0166ecfa6f6bb696dc234fe6c59a66c3f15facc922b46c60b0b856a6702e31940f08b5cb5a9ec251d3df874ee5d8a19de681b4641858709ba40b7cdc4bdb06310dfdf8490a6d5eabafc490df70d4f4a981d407ab0dc87948939d460591f6dae5bfc887daabc87be85c6b0e7bd5e3ffd982168d5745b856adf6cd16a44f47e0c16b9fea70c0d4d8c1c611f07ed3ab5e9e2a4090a9c19dd82ad7560b3f162f47eef9e8e9f102f0f6c7b301251697b7777241e7050ee007a66eb3dc29451c17a4e6b20eaaedd96c166a43cdd7bb7bd9e1bb515e27a08c1e06f06e6205e2243ca651522df6a79be783d01fa6616aa894e313f3ff96ea29b57c792521c69760f75ca6c240f0cc76a4ca3b38007d27e8d03c6f7d5faa7d197a5feee9714e98aec6f0ca8ba1abe9b3678c86461092d20407536ad093c09cce81c28540893639e8751e692a32c172fdcd8f1e00c49880f084c729978b0fb46468f50e6d2d33c09471ca399edb75948bd928ab060d02d0a14ff44f66b9dde670194ef25a5f3627b25e3ffacfb87953244572c4bcff9d51de3023dc4db483594100bbf29e2742dd4baea9031ff1fc0c2222b099638af437f4d894c455d22445f93fe27a2fa2465185fcb432ce29e9df91a09ebd81e91b7c67cfdb0691598b8c93eb4360ff35f5784b8bec50584de681f48425b8465a35e5680e0ea0e29f5513e91ce81398dfa3b6f58e7cc99106a839895e5ebe5dbafbce1ee369b70b38068027ba51cb65a0697c77be286c751a292457a17a8abd89383e59645ec462ae819b3fdc6edb7c529789e003677906ae9d56713bba21e463f2be45fb516eea260d22a4d3a297bceb7c831f35c0d88084856f102affc121bd13f95afb35cb994b949848e849e9535ca372fee2d403581c853885426b12d1d1ae2bf053ec268c842c81bba4d116c029cbd92cd46121ca360d9dc6afbc5bc73f06c3a230483ad7279cf9c4ab7b4436b990863edfce448cddacd01e75283ee53e2e2c4585d636595b812f97f84e857a989d6ac4489136a68bda4c617cad0972ffa4d913aa1a06a0e8f7a82fdcaf0d1e41894c04afecf899dc906814efe49b14bdf64b7e6d00bea0961598313fbd129a870017d5b3ca1bc5a625efec4e1495893d6bd546597989ca9ccaa5326ea1e8fcc36b5c6b0fb5a0f259562d82b3bc7e71edcd302ec3275b789d88c70bfdb4df53ab0b53b592a223afdaf283d77f1eda982a0365635ba54e283af1aed97019e9327045b2c05bb5b17d352557ffd57e9009e63eb78a524da49728a943ba57d7bb9c081b96911ecd16595df71a4f3ab2d1eb68bacc6de40e08acd9fa61f6bbae2988faff9b357c79d7065ccc18d2fd467141398a31c6332f250e6ac42cf95d77729e1b55d08a757095fed2aeb5750acd0b7507fa6b9ae824defb39e52b5d1d6f4b30c5cce077ccad3a089cf519dad066129802898e24a97432dabe229997f75a143d6b1f7c4822afcee89a75b738cfed4f0bb5f367d7a0ca6b654132c9cb2faf13cb8ea5b76132b9d1c7a12ebf395816e83322a8c35a79a0a840477d3f4a6ad7455e2594b2ce9b8cc86210d712156abc128a5f691a471f49bd5bb66b1a3e293a748b01967b238bb81a68515f5940540ad7626aaeaf272f2028500ec065345ea0fae291701ecae1cb4453347f2a7f7479bc2f8ec65181f27da73c66809bedf1d26fcd67fbca023ebc9e9d32390a9cf68cdfd69cf45a867b380322aae515012ce6a9cdf4bc7914aa3677418393597f546049543c375624669c0d1a2b545a5a46219d2540e117400c19ef14f8c7abcb1969367a37897f20cff784619596c9c546249ccc2898c85de2edf110879e311ec0363f425b9754f21e69091a69ca1daf875567d79910c7a078e760e73f9d9436783922137067c9518b495acabf594e8be8552539cc7ead7347723a74e0af821f2f05ebf34461131fcf4a3d6e77b90851d28d46999a674ece112b1f6381a6476852bec3b1f6e6ecd4ad0572b722f681b7e24cf79addc719aedcc01281b62c4328e0dd22d8bfc1aee1e24d43e1ebfb8b183453dd672ae27be434162d822eea580b0cdc7a99c0cd6f25a77ce4c98ed1127aa6dfcf402c4fc4b64c2cb5385802e4ea8fbce0900cbc46db625eddaffad75da147100c516fc2d864f18ce55b1135a3951d280d05e00d4f0b5e04c6b90f5abe677932f22179c2ceebaaa6fdd13dbe79b71bc775d6466a6efb7d17fc6be4a4878e8632c44aa83c11ca72b467dbc92f3f187c82da6fc204bbbfc547d29acc5aeaa1a5b369e7d060df860ec541f7bfd9342ee1fafd37b34a9346e78a4cf8977a47897933334702b0a935bf9e22c7d42ef1d83f1188fc9cf24eff988c9050965b617707668a4267be481f8e7edd23e5d23fe9deda802a339111835f751069fee566bdf0262b487d62903a7ebaaf64b90e10e5c446ee2cd035398b3de171e3ed4918714571677c304bf0eaddc1e53628e82176757e4229fecb66e3d6748cb408bd37439b7aaf72001b7728a6a6a2021f2556c22b033f9b17b154dae298b94bdbbd23a5678ce564f1aa1f8db7ec91f8f209e7a4e449198f25c4593a23adc9a8c642cf96adb5956a92cf8f0921f4697fff4e13ebfecf870081fe6088567fde83202389853a09b81b40e954b7c9b45ccb527816041adc3da1714f91af7d8326e79e799e7a438eb715c08ba88634e8aac486d89907bfa8859eee67b2c7aec8b89c81e1de792d96f9221d54a2b7d6f963cfee3a91e9b0397a0aaa211fc368e9498c8d246e184ef4044c98e10468f599f9f119810495b3dc296fb980826f74ac19171dc15fe3631ad078941f034ab64d45038a34a16b3009336e531d109df05089183caa9013b37d091ff1087a43b3f90632d05bd62810be535f43af0d5975ea989e0d9a3d8b25f87a5a8d83a588f1102ae83623c82071d226b63250dfb70aacb620da04848e84a39935deea8aa566d8e611bbab2d5f538e459226d99ae157ff9464575cef6afc0b20e6c36a5352054bdaefc8c3b896bd470f98289fe4a2cc807d5c2610df8f370d0da774303b3c467b6454a60830aa41c954fd702f7715ae21449f790e671f4a83f32ddaf022257c169471cbb10a4b0bf806cb26c91477ffb994302ad8dc37ad1a115a6b89b71e88aae0f955b15340033c3bc7973c27fbe34282817b611a7dd8f7233c2052c6320da763ed460f999f04fc076d6ad31e9bc746adeb5efbbbb8d1ca5b9b1cab3caf1cdd846eea6c946eee43973cb1029bc9c8c45305284719c65e4c06c0b1d3e97c04154f419c1e8001c204154a9fb71ee36a62f408314ea50da1e95e5702234bad88efd2df18fb8b0a0cc6dd880145ce5129f39cfedee2eec8d9f30055ad9e0241980a01b389ae1f0a6e2b9638a8183545face97a6acfc692023a2bc0142381dac9f6e897f661db5c3d8408c337bcd7a5eea00242aa775aede6fd733e7ccff28a91a07a143dd8cea55eec194851c3b7888a54aa9b4a545463454c41357a48b80de2c5c84e6b840dcf713dacb9299fd2924a1bf928f72f43ba6ceca41fc433fb26cd49e07195a0468ca265e960193d32a750ab643e5df1488c725fe1e24c20d8ae5953b068c15e0d56be24bc4f5cc2c6e9598565a01934874d362e280301dc57b9153b2c57c863cdccda277bbb05134435e182d3c5d12ec01f32ca27cb96992f1c520bf768e4ce2b9e506d557a17412c14c0e01f81f89a90f3e7705d6ce907b89725a20367d5ab51b0f872d425404baf7782c20980f5dc7293502e87623cc5da1265615b6cdda651ceaf24a58ee5211ff1849459f6383eaac4a6761866b1df672e137d021dfc5d4c4f26ca5695ac157e080a8ae6bf890cce7e6610fb857ef7f8d8dd4703a62886debf38b546c4be7993e5d6ea9b8bb0787d013f421723fc2c5396fa006143897a3ae7d6023b7c22bca55509e192d7027b123a35e198c6101c608968b9f380fa6d96f84cf3cb944edd6858aaf297b3164e228828603a6208f734af740895fbfc2e698881faeba276c45b16ed3e63440dda0baa5c4d5b3dc13177641058c0a726cac8b06ef340fe78c783eb90bce9ac579f89b9baf5270745ca0c1ee199260e27c1e17fd721e4287d12c354246bd256eb4647b695b8dfe0437ee270b8d6b72342dddd8fb49282305daeb310b995a2de81c8f72ced450915b119dcf78081c14a85f0ef4a90144f987a0ec579cd4c4def0c2b49d9ef57cfb16e8c399788aaa61e596afc756020748607024b5784c6c16d75ef18e0f963755ae840535cdbbf8191ec8bd4ba8548054fe0d4d24137"}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x0, 0x6902, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f75437d, 0x0, 0x0, 0xbd66, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000001340)=ANY=[@ANYBLOB="40000000ce528eeecc300c82a3f7d85210003b0e", @ANYRES32=0x0, @ANYBLOB="430200000000000008000a00", @ANYRES32=0x6, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) mkdir(&(0x7f0000000200)='./bus\x00', 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x80804, 0x0) [ 2347.986983] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2347.996032] audit: type=1400 audit(1549744553.570:10773): avc: denied { map } for pid=12906 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2348.026030] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2348.034369] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2348.043496] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2348.051007] audit: type=1400 audit(1549744553.590:10774): avc: denied { map } for pid=12907 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2348.051780] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2348.083140] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2348.092733] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2348.108569] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2348.115759] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2348.123840] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 20:35:54 executing program 5: clone(0x201, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x27) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x34000, 0x0) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) r3 = dup3(r1, r2, 0x80000) fcntl$setlease(r3, 0x400, 0x3) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xce}) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000140)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000180)=0x5) ptrace$cont(0x1f, r0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x0, 0x0) [ 2348.138494] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz1 [ 2348.201914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=21198 sclass=netlink_route_socket pig=12929 comm=syz-executor.2 [ 2348.265595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=21198 sclass=netlink_route_socket pig=12932 comm=syz-executor.2 20:35:54 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0), 0x0) write(r0, &(0x7f00000001c0)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) 20:35:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000100)={'teql0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000540)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'eql\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000005c0)={'team0\x00', 0x0}) getsockname$packet(r0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000940)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000980)={0x0, @local, @local}, &(0x7f00000009c0)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000003580)={@multicast2, @multicast1, 0x0}, &(0x7f00000035c0)=0xc) getpeername$packet(r0, &(0x7f00000088c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000008900)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000008940)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000008a40)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000008ac0)={@rand_addr, 0x0}, &(0x7f0000008b00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008c80)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000008d80)=0xe8) accept$packet(r0, &(0x7f000000a800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a840)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000aa80)={'team_slave_1\x00', 0x0}) accept4$packet(r0, &(0x7f000000aac0)={0x11, 0x0, 0x0}, &(0x7f000000ab00)=0x14, 0x800) accept$packet(r0, &(0x7f000000ab40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ab80)=0x14) r19 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) r20 = add_key(&(0x7f00000003c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000600)="548822ecbeecb85694dc18", 0xb, 0xfffffffffffffffe) keyctl$link(0x8, r19, r20) accept4$packet(r0, &(0x7f000000abc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac00)=0x14, 0x80000) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f000000b300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f000000b2c0)={&(0x7f000000ac40)=ANY=[@ANYBLOB="78060000", @ANYRES16=r1, @ANYBLOB="240125bd7000fddbdf250300000008000100", @ANYRES32=r2, @ANYBLOB="3401020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000700000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e636500400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000500000008000600", @ANYRES32=r3, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400ffffff7f40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000500000008000600", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="400002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="f000020040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f61646361737400000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400080000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYRES32=r8, @ANYBLOB="b40002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r9, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000500000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r10, @ANYBLOB="080007000000000008000100", @ANYRES32=r11, @ANYBLOB="6c01020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400ffffffff08000600", @ANYRES32=r12, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400ff7f0000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000100000008000600", @ANYRES32=r13, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r14, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000100000008000600", @ANYRES32=r15, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32=r17, @ANYBLOB="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", @ANYRES32=r18, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r21, @ANYBLOB="380001002400010072735f696e74540000006c0003000000eb7e4f7fdfe0b73d0000000000000000000000000000"], 0x678}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) r22 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r22, 0x0, 0x0) 20:35:54 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000000800)="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", 0x600) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0xffffffff, 0x628, 0x4c2b2676, 0x100, 0xfffffffffffffffd, 0x5816}) sendfile(r1, r2, 0x0, 0x10000) 20:36:01 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) fchmod(0xffffffffffffffff, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r5}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:01 executing program 0: llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/23, 0x17) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup3(r0, r0, 0x0) r2 = accept$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000400)={@local, 0x41, r3}) getsockopt$inet6_int(r0, 0x3a, 0x1, 0x0, &(0x7f0000001780)) io_setup(0x3b, &(0x7f0000000080)=0x0) io_submit(r4, 0x6, &(0x7f00000016c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x4, r0, &(0x7f0000000180)="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", 0xff, 0x4, 0x0, 0x0, r1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xf, 0x3, r2, &(0x7f00000002c0)="e7f1667c422cb913434774f869bcfe85552c825c55d36561df", 0x19, 0x7, 0x0, 0x3, r1}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000440)="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", 0x1000, 0xfffffffffffffffc, 0x0, 0x1, r1}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x3, 0x4, r1, &(0x7f0000001440)="8ae8d4481f8dad80aba44acd1943ef1820052fdfb78fd80597bf6d82d8de0db3e62a6289face32b8cbdfde19594586fdc54f81539f4e45fa9e596e7627e965d7f883a30ca47d37936b87c4a8608e0c828c70422e8fc7b050191f58a38870d5650d903d8455ddb10d46e4c3256b3a9c734c3cad8f578c9d71be6e82322a78c4020fe5404d44bcf5d24a650ec3db3e41", 0x8f, 0x9, 0x0, 0x2, r1}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000001540)="f96021c9e77f4c549dc3f592d06159ef606033a4af71fb6bb5b2e595b6840df657dcf7497965fe643878580c0195a8f6852c3fa036426745cbb6755be417dfc365f869f3daaf851ba0bdc8b372e6b0b29204461626e8465e07fcd2c2cc07e7aaca192b85877bf9f50b35af98b4e0ae2ba4531b661e29be1d3e0aa1e20a", 0x7d, 0x2, 0x0, 0x2, r1}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x1ff, r0, &(0x7f0000001600)="dec7f683a7855a1301e2fba22d70075a961f75dca6413cbf674ad8c603e3479d675c557e6e0e6d4bb39f5d7fa7f2e1ddb3e6d4d1f5221e221a8afff95d1fd0f85bfb87ffe1de4fa526b57e03a710ca9a27b07264bd3e116cc3b48e7a63da22cbdbc72f5fbc29eae8", 0x68, 0x8001, 0x0, 0x1, r1}]) sendto$packet(r2, &(0x7f0000000100)="3116c97e99e4f0b6e3016933b430651169a1537cdd3ef8d297d875371776a67350f6054dc3b77eb8bafeb16e059b0d27f16f606b517670f6360087fabe1040d647153b8db7", 0x45, 0x4000000, 0x0, 0x0) 20:36:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00'}, 0x48) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0}, 0x2c) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x4) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x404000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast1, @initdev}, &(0x7f0000000200)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000240)={@dev={0xfe, 0x80, [], 0x2b}, 0x30, r4}) fcntl$dupfd(r1, 0x406, r2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xd0b3e7cc26e02b35) 20:36:01 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffee9}}, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000480)={0x7ff, 0xc0}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x3}) socketpair(0x9, 0x5, 0x800, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r0, 0x0, 0x0) prctl$PR_GET_ENDIAN(0x13, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) pipe(&(0x7f00000002c0)) r1 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) write(r4, &(0x7f00000001c0), 0x100000073) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000100)) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) 20:36:01 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/dev_snmp6\x00') write$selinux_context(r0, &(0x7f0000000000)='system_u:object_r:semanage_trans_lock_t:s0\n', 0xffffffffffffffc7) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xd0, r2, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xbc, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xef3f}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000180)={'nat\x00', 0x0, 0x4, 0x5, [], 0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=""/5}, &(0x7f0000000100)=0x78) 20:36:01 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'hwsim0\x00', 0x400}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x5) 20:36:01 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r0) sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f00000005c0)={0x0, 0xfe96, &(0x7f0000000580)={0x0, 0x147}}, 0x0) [ 2355.323816] kauditd_printk_skb: 33 callbacks suppressed [ 2355.323825] audit: type=1400 audit(1549744561.230:10808): avc: denied { prog_load } for pid=12962 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2355.373438] audit: type=1400 audit(1549744561.250:10809): avc: denied { map_create } for pid=12962 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2355.403063] audit: type=1400 audit(1549744561.260:10810): avc: denied { map_read map_write } for pid=12962 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2355.432482] audit: type=1400 audit(1549744561.290:10811): avc: denied { map } for pid=12971 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2355.462365] audit: type=1400 audit(1549744561.350:10812): avc: denied { map } for pid=12973 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2355.488692] audit: type=1400 audit(1549744561.360:10813): avc: denied { prog_load } for pid=12962 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:36:01 executing program 3: [ 2355.517028] audit: type=1400 audit(1549744561.390:10814): avc: denied { map_create } for pid=12962 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2355.545367] audit: type=1400 audit(1549744561.390:10815): avc: denied { map_read map_write } for pid=12962 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2355.572157] audit: type=1400 audit(1549744561.440:10816): avc: denied { create } for pid=12972 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2355.598812] audit: type=1400 audit(1549744561.440:10817): avc: denied { write } for pid=12972 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:36:01 executing program 2: 20:36:01 executing program 3: 20:36:01 executing program 2: 20:36:01 executing program 3: 20:36:03 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) fchmod(0xffffffffffffffff, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r5}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:03 executing program 3: 20:36:03 executing program 5: 20:36:03 executing program 2: 20:36:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/raw6\x00') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000000)=0x10000, 0x4) r1 = socket$inet6(0xa, 0x2, 0x400) connect$inet6(r1, 0x0, 0x0) 20:36:03 executing program 0: 20:36:03 executing program 3: 20:36:03 executing program 2: 20:36:03 executing program 5: 20:36:03 executing program 2: syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d790066420fe2e3c441796fe8c442019dc181fb3d000000cc196f") mknod(&(0x7f0000000040)='./file0\x00', 0x400c4c, 0x0) clone(0x3102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)={'syz0'}, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 20:36:03 executing program 3: io_setup(0xb27f, &(0x7f00000001c0)) clock_gettime(0x0, 0x0) rt_sigtimedwait(0x0, 0x0, &(0x7f00000028c0), 0x0) io_setup(0x1fc, &(0x7f0000002980)=0x0) io_submit(r0, 0x1, &(0x7f0000002700)=[&(0x7f00000026c0)={0x0, 0x0, 0x0, 0x7, 0xffffffff, 0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x1, 0x0, 0x3}]) 20:36:03 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) 20:36:11 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, &(0x7f0000000400)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x0, 0x0}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8946, 0x0) 20:36:11 executing program 0: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103b, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000001ac0)=""/11, 0x58) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, 0x0) 20:36:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00'}, 0x48) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0}, 0x2c) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x4) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x404000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast1, @initdev}, &(0x7f0000000200)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000240)={@dev={0xfe, 0x80, [], 0x2b}, 0x30, r4}) fcntl$dupfd(r1, 0x406, r2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xd0b3e7cc26e02b35) 20:36:11 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) 20:36:11 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="02042dbd7000fc000c000200080002004e200015080004004d00000014000100080005000000000008000900770000003000030414000600005a45efe7060000000000000000ffffffffffff08000500ac1414bb0801080600000000080007004e2100005d000407fd844378fd536307379e023b0057cc8d237c282918bf40128fdd6d3b9ac482627a4173f3d26080b3c8b5214ac76597d9a4d5c5f058fbaf5db704622f62cc1af932e0528eb34a90a84ac1c603a85d273d347ff41a975e64c21ed24b7c3f1596b3a3b5cf68f308b7a38dd4b1daf82a3b87278b21c0492bed58e01e7d4783050000004ca3b4c5fae4639ab635054f469722e95dada1f361a949d0ee460e313674d470024bb54db260eda4974fb622698c2fc2596bdaa96040ca178df4d5757fb1257c3001000000000000002ca33d107e770f50c11f8938e560522aa795b7c84cf2de19d16e42046de61e3775326e9ab668ac894a6598cd1b85c9e18cef07fd016f12c89e37719a5b39777f18a1634fa8772cee025e11d36fda12a3359a014e784ef0a0ca7c41feb23ac0926b953c9a4f9a7f77e64e49b083559a2e4f7014d036968a351fb5f8c3abb2c2db422c041c5533518615a07413afe59cdf2d55da68"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x20, @empty, 0xff}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000000540)=[{0x0}], 0x1) listen(r0, 0x7f) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='\x00\x00\x00\x1a\xe3\npK\xa9\xf9\xe5\x9c\xfb0\x97%/|(\xc5\x8d t/R\v\xdbxl\xa9H\x82\x00\x00\x00', 0x200002, 0x0) fchdir(r0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0xc44) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$selinux_context(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000580)='htcp\x00', 0x5) ioctl$int_out(r1, 0x0, 0x0) write$cgroup_type(r3, &(0x7f0000000240)='threaded\x00', 0x9) write(0xffffffffffffffff, 0x0, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, &(0x7f00000001c0), &(0x7f0000000280)={0x77359400}) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0xffff, @ipv4={[], [], @empty}}, 0x317) ioctl$FIDEDUPERANGE(r2, 0xc0189436, 0x0) r4 = open(&(0x7f00000005c0)='./bus\x00', 0x200, 0x0) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000340)='ip6tnl0\x00') r5 = accept4(r0, 0x0, 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r7 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000440)=""/206, &(0x7f0000000000)=0xce) getsockopt$inet6_int(r7, 0x29, 0x42, &(0x7f0000b67000), &(0x7f00007d0000)=0x4) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 2365.721499] kauditd_printk_skb: 48 callbacks suppressed [ 2365.721508] audit: type=1400 audit(1549744571.630:10866): avc: denied { prog_load } for pid=13071 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2365.803615] audit: type=1400 audit(1549744571.660:10867): avc: denied { map_create } for pid=13071 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:36:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00'}, 0x48) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0}, 0x2c) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x4) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x404000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast1, @initdev}, &(0x7f0000000200)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000240)={@dev={0xfe, 0x80, [], 0x2b}, 0x30, r4}) fcntl$dupfd(r1, 0x406, r2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xd0b3e7cc26e02b35) [ 2365.834046] audit: type=1400 audit(1549744571.670:10868): avc: denied { map_read map_write } for pid=13071 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2365.864374] audit: type=1400 audit(1549744571.670:10869): avc: denied { map } for pid=13078 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2365.902641] audit: type=1400 audit(1549744571.770:10870): avc: denied { create } for pid=13077 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2365.979008] audit: type=1400 audit(1549744571.770:10871): avc: denied { write } for pid=13077 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2366.011904] audit: type=1400 audit(1549744571.770:10872): avc: denied { map } for pid=13089 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:36:12 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="02042dbd7000fc000c000200080002004e200015080004004d00000014000100080005000000000008000900770000003000030414000600005a45efe7060000000000000000ffffffffffff08000500ac1414bb0801080600000000080007004e2100005d000407fd844378fd536307379e023b0057cc8d237c282918bf40128fdd6d3b9ac482627a4173f3d26080b3c8b5214ac76597d9a4d5c5f058fbaf5db704622f62cc1af932e0528eb34a90a84ac1c603a85d273d347ff41a975e64c21ed24b7c3f1596b3a3b5cf68f308b7a38dd4b1daf82a3b87278b21c0492bed58e01e7d4783050000004ca3b4c5fae4639ab635054f469722e95dada1f361a949d0ee460e313674d470024bb54db260eda4974fb622698c2fc2596bdaa96040ca178df4d5757fb1257c3001000000000000002ca33d107e770f50c11f8938e560522aa795b7c84cf2de19d16e42046de61e3775326e9ab668ac894a6598cd1b85c9e18cef07fd016f12c89e37719a5b39777f18a1634fa8772cee025e11d36fda12a3359a014e784ef0a0ca7c41feb23ac0926b953c9a4f9a7f77e64e49b083559a2e4f7014d036968a351fb5f8c3abb2c2db422c041c5533518615a07413afe59cdf2d55da68"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) [ 2366.069742] audit: type=1400 audit(1549744571.770:10873): avc: denied { map } for pid=13089 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2366.115358] audit: type=1400 audit(1549744571.780:10874): avc: denied { read } for pid=13077 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:36:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00'}, 0x48) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0}, 0x2c) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x4) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x404000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast1, @initdev}, &(0x7f0000000200)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000240)={@dev={0xfe, 0x80, [], 0x2b}, 0x30, r4}) fcntl$dupfd(r1, 0x406, r2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xd0b3e7cc26e02b35) [ 2366.224401] audit: type=1400 audit(1549744571.790:10875): avc: denied { create } for pid=13077 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:36:12 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = creat(&(0x7f00000004c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000001180)='threaded\x00', 0xfc9a) fallocate(r3, 0x0, 0x0, 0x10001) fallocate(r3, 0x3, 0x5e00, 0x2cbd) fallocate(r1, 0x11, 0x401, 0x10000) sendfile(r1, r2, 0x0, 0xffffffff000) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r4, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, 0x0, 0x0) 20:36:12 executing program 3: memfd_create(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f000000d000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @local, 0x2}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e2002089078"], 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x8) 20:36:12 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="02042dbd7000fc000c000200080002004e200015080004004d00000014000100080005000000000008000900770000003000030414000600005a45efe7060000000000000000ffffffffffff08000500ac1414bb0801080600000000080007004e2100005d000407fd844378fd536307379e023b0057cc8d237c282918bf40128fdd6d3b9ac482627a4173f3d26080b3c8b5214ac76597d9a4d5c5f058fbaf5db704622f62cc1af932e0528eb34a90a84ac1c603a85d273d347ff41a975e64c21ed24b7c3f1596b3a3b5cf68f308b7a38dd4b1daf82a3b87278b21c0492bed58e01e7d4783050000004ca3b4c5fae4639ab635054f469722e95dada1f361a949d0ee460e313674d470024bb54db260eda4974fb622698c2fc2596bdaa96040ca178df4d5757fb1257c3001000000000000002ca33d107e770f50c11f8938e560522aa795b7c84cf2de19d16e42046de61e3775326e9ab668ac894a6598cd1b85c9e18cef07fd016f12c89e37719a5b39777f18a1634fa8772cee025e11d36fda12a3359a014e784ef0a0ca7c41feb23ac0926b953c9a4f9a7f77e64e49b083559a2e4f7014d036968a351fb5f8c3abb2c2db422c041c5533518615a07413afe59cdf2d55da68"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="080007000000000040000100240001006c625f68616a785f737461747300000000000000000000000000000000000000080003000b00000008000400880600000800070000000000e4080013d6294e9f20a8e4a5fc3905a8e0f3a27c844f337a28328687ed809590422b35f676769e83271f054b56cef851b5c717fd668ac7a7433aadfb85788c64067fdb94dc570173a35f89e5078b4518334c88fccd36ae0f7d285f649db6802b0751d8781fcb58316a270e003f682083eaedbd685c0850b885cb2e105e8446f209f66569c9033f552e75a5fa27a150e50de7805a19de60ebbc4c5774afcd02e5a34862775965f6f4062622d32e801e6238e87a7087a801000000000000007fb279d4563da0533abf489d3c23cf9ad5f033d3e1e96b80f9f306efaa94e62107c26747531f34dd93fe1608b69ca25c744bbd7df31f5c7dfbb97163fda5d861bd81bb11399f66fb12a2da387a03f8dd33bee7cba7f724b16a5bcc48af8c23922cc1f5980a28dbe0297d0fe1fca55c6f70ed7fe074834596dbf62d19d7c903fa8fbb0969184af2542110293b580e756ec016a413d34d22d9dd36e5ec9fa29a2d8b34125bd435d5b762d963dd8a9f2136f2f937184b5229d72ba13655e29dc86391cc1489d2f176f80c7b8773824202e3e54c925cde75d638700ad40980e4b586c94fd1a354748241269d023ee23759b0b2dbf4e342200eb2bfab878ddebaf137a400979fac78e1d1443b806800000000b8bf7ccaacb724b1b2ddd74e6c75516efe74e189fef59fb06e900d721fded45458ef0e0aaa1814a2858bb36c4832a7520792ee4bca334528baf9003700000000000000f67f0276a139d423d5464bfa47fe0932bce55f6408dfaf5c295c50819549ff363a4b649bb8d55d8fe41ae9576caf7a32f14583eba73d3b9019bbd6cb1b4f5647cff6be2a2900000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x2}) readahead(r0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000001c0)) socketpair(0x1d, 0x7, 0x40e, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) 20:36:12 executing program 2: syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000000)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x300, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000100)=""/61, 0x3d, 0x5, 0x1f, 0xffffffff, 0x3, 0x9}, 0x120) 20:36:12 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:12 executing program 3: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f00000001c0), 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)) getegid() r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001600)='/proc/self/net/pfkey\x00', 0x0, 0x0) rt_sigaction(0x13, &(0x7f0000000400)={&(0x7f0000000380)="8f49a09923c48209a75800c421f16310c4c1175829420f8200000000c4228d8c2c82c4618968c4c4a1adfc9a0000010066d04a0bc4c2394667ce", {0x1}, 0x0, &(0x7f00000003c0)="44e670c423dd6bb00000000000410f5bd78f49f09301f20f7dd18f69c89208c442bd9c5899c40140c6b8000000000cc4e2791c7fab65f20f2aaa0b000000"}, &(0x7f00000004c0)={&(0x7f0000000440)="2666400f73d2c4f241e105467b00c481dde92d5b000000c442d9038fdf9300000ffeea460db8000000c42119f1d7470c00430f61fa", {}, 0x0, &(0x7f0000000480)="8fc9b092edf3410f70da8847d9fc650f1b62f440ff2bf2460f8c0a000000c4227d59580044dc7a99420f01ddc4e17973f400"}, 0x8, &(0x7f0000000500)) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x10001, 0x0, 0xde4d, 0x0, 0xffff, 0x1, 0x7, 0x4, 0x0, 0x0, 0x6512dd2a, 0x0, 0x0, 0x10001, 0x7ec5, 0xb12, 0x9, 0xffffffffffff9a6a, 0x40, 0x6, 0x4, 0x60000000, 0x4b95, 0x5e, 0x2, 0x4, 0xfffffffffffff000, 0x6, 0x2, 0x8, 0xffffffffffffff00, 0x6, 0xc1, 0xffffffffffffffeb, 0x4, 0x0, 0x6, 0x4, @perf_config_ext={0x7, 0x3f}, 0x20, 0xffffffffffff8c04, 0x8001, 0x2, 0x1, 0x4, 0xd8}, 0x0, 0xf, r1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) pipe2(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000014c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001640)='./file0\x00', 0x1) bind$unix(r4, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e20}, 0x6e) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000001500)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) fsetxattr$security_smack_transmute(r4, &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x2) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001b80), 0x0, 0x8000) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) write$P9_RWALK(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="640000000000000000000001020000d3a8c146dc319695c9650d00020000000000000000000000000000000000000000010000000008d8d46f3ce4f58323245bed5d8768a220000000000000d902000000020000000000000020040000000700000000000000800100400007"], 0x6c) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000001580)) sendmmsg(0xffffffffffffffff, &(0x7f0000000240), 0x5c3, 0x0) waitid(0x1, 0x0, &(0x7f0000001540), 0x80000003, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000002c0)) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000001bc0)={0x0, 0x0, 0x2, 0x3}) flock(r2, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="153f62010000000000000016cded2b8e6bc44c2d4668626a") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[]}}, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x9, 0x0, 0x9, 0x2}, 0x10}}, 0x0) 20:36:12 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000180)={0x5, 0x74, &(0x7f0000000100)="c3719652cd2fbcd65dc065455c40247c0dc8cc1664ae2bb8c953ed8e27e6282a2488a87a7a594e6d46223ed59609d9c05ad92974c93f4c22a3e474dc846e90da4c8ad7e02e51c300922a887d47a3caef7bcd0dc7848589cc991cf8e07d618cd242c1130bcbfdccbb632d3751beb8349ba0cf8aef"}) r1 = socket$netlink(0x10, 0x3, 0x1a) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001800050b00000000000000000a0000000000000000000000100016000c0000000000000000000000080017000000000019e851a010ac2af8902aa7e696fa4c333712b7e8483fb406f79f73613c0a1b1e05a347330d0504111b046a8bfe3b2307f5934e5eae58f7ff66b687507fa623e4d40e4e583d9e5a0a38e61c76957605e636dddb2cc82906f62f72cec1c0625698b0c89e7977ec233997f89dcc130dac6eb9d3ac889a96965afd2f60e80b8ded0a062512497ad667d6c6f44293"], 0x34}}, 0x0) 20:36:12 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffcaa, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)='ip6tnl0\x00') 20:36:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0xa, 0x400000f9da) connect$inet6(r1, 0x0, 0x0) 20:36:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) mremap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000000a000/0x1000)=nil) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 20:36:12 executing program 5: pipe(&(0x7f0000000000)) setpriority(0x0, 0xffffffffffffffff, 0x0) 20:36:13 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3c1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xffffffea) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x2c}], 0x100002a3, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 20:36:13 executing program 5: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x2, &(0x7f0000000180)={0x0, 0x8000, 0x1}) rt_sigtimedwait(&(0x7f0000000200)={0x7fffffffffffff66}, &(0x7f0000000100), 0x0, 0x8) 20:36:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x7b, &(0x7f00000000c0)=0x2, 0x4) r3 = getpgid(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000000)=r3) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000ac5000), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x53, 0x0) r4 = memfd_create(&(0x7f0000000040)='dev A\x1a\xf5}\x11T\xd9S\xba\x80K,\x1a\xfdm\xa7\xfc\x869)\xc7\x1aM\xe8K\xe1\x1a^\xef\xa6\x160\x03\xf4\x1d\x85\xeaN\xf1(\xce\xff\xf6', 0x0) write(r4, &(0x7f00000001c0)="16", 0x1) sendfile(r0, r2, &(0x7f0000000200), 0xfffc) mkdirat$cgroup(r2, &(0x7f0000000100)='syz1\x00', 0x1ff) fcntl$addseals(r4, 0x409, 0x8) r5 = dup2(r1, r0) ioctl$TIOCLINUX6(r5, 0x541c, &(0x7f0000000180)={0x6, 0x81}) 20:36:13 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000019007f5300fe01b2a4a280930a06000000a84308910000003900090008000c00060000001900150004000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/204, 0xcc}, {&(0x7f00000002c0)=""/217, 0xd9}], 0x2) 20:36:13 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0xd7, &(0x7f0000000080)="9d9716dc7c0657", 0x7) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r2, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) socket$inet_udp(0x2, 0x2, 0x0) connect$inet6(r3, 0x0, 0x0) 20:36:13 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x2, 0x20000000}, 0x1c) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f00000001c0), 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) getegid() r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001600)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0xde4d, 0x0, 0x0, 0x1, 0x7, 0x0, 0x7, 0x0, 0x6512dd2a, 0xfffffffffffffffd, 0x3, 0x10001, 0x7ec5, 0x0, 0x9, 0xffffffffffff9a6a, 0x0, 0x0, 0x4, 0x60000000, 0x4b95, 0x5e, 0x2, 0x0, 0xfffffffffffff000, 0x6, 0x2, 0x8, 0xffffffffffffff00, 0x6, 0xc1, 0xffffffffffffffeb, 0x4, 0x0, 0x6, 0x4, @perf_config_ext={0x7, 0x3f}, 0x0, 0xffffffffffff8c04, 0x8001, 0x2, 0x1, 0x0, 0xd8}, 0x0, 0xf, r2, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffd, 0x5}}, 0xe8) connect$inet6(r3, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="6400000000000000000000010000000002000000000000000000000000000000000000001801000000000820000000000000000000"], 0x35) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000001580)) sendmmsg(r3, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)={0x2, 0xa, 0x67f0, 0x3, 0x7, 0x0, 0x70bd25, 0x0, [@sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e21, @loopback}}]}, 0x38}}, 0xc800) ioctl$TIOCGPTPEER(r0, 0x5441, 0x2) 20:36:13 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:13 executing program 2: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) fsetxattr$security_smack_transmute(r0, &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000340)='TRUE', 0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x420480, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x100000000) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000180)) syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x7, 0x400) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x8000, 0x0) capget(&(0x7f0000000080)={0x20080522}, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000240)=0x2) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 20:36:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000600)=ANY=[@ANYBLOB="0180c2001000004239ca4d0014000000880bb40000241ce5da9578ac101d0de0000001d16c6e68d49e11095bfef2776c0001000004010778504ffa50f6f434755965e5529968755d6c21016b1a5606c2b167ed000000000000002ab078de864cc2c3ee55c6ea5e1f9285"], 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x100, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x1, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x1, 0xc7, 0x8, 0x2]}, 0x5c) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000300)={'team0\x00', 0x43}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000cc0)=0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000480)=0x1, 0x4) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x40000000020087, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) clock_nanosleep(0x0, 0x1, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x806, 0x0) ioctl(r3, 0xc1, &(0x7f00000004c0)="da7d4b86c2818b75c47f9771d213aedc1cf42145619d6d4f3d64117bf61b5127ad7af6959693156c7711fe75eabf00799280241f1e5aad27d1f3ba517f4aadabeadf5f1953569ed70cee0b91162c85a0e14e7b79821c0ba0b136b09e") io_setup(0x4, &(0x7f0000000080)) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r5, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x2004c004) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f00000001c0)=0x200) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000340)) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000680)=@filter={'filter\x00', 0xe, 0x4, 0x580, 0x2b0, 0x1c0, 0x0, 0x0, 0x0, 0x500, 0x500, 0x500, 0x500, 0x500, 0x4, &(0x7f0000000140), {[{{@uncond, 0x0, 0x158, 0x198, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x3c, 0x101, 0x10000, 0x7, 0x0, @dev={0xfe, 0x80, [], 0x2a}, @empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xffffffff, 0xffffffff, 0xffffff00, 0xffffff00], [0xff, 0xff0000ff, 0xff, 0xffffffff], [0xff, 0xffffffff, 0xffffffff, 0xffffff00], 0x20, 0x208}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x7fffffff, 0x24, "795ca1f8f009f4b635fcabf92299592cc686f8d21e350894ddcf44ba26ef"}}}, {{@ipv6={@ipv4={[], [], @multicast1}, @empty, [0xff, 0xff000000, 0xff000000, 0xffffffff], [0xffffffff, 0xffffff00, 0xffffff00, 0xffffffff], 'syzkaller1\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x33, 0x8, 0x1, 0x2}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@ipv4={[], [], @multicast1}, @empty, [0xffffffff, 0xffffffff, 0xff0000ff, 0xff0000ff], [0xffffff00, 0xffffff00, 0x0, 0xffffff00], 'gretap0\x00', 'ip6tnl0\x00', {0xff}, {0xd0d226dc9926f54f}, 0x7f, 0x100, 0x1}, 0x0, 0x200, 0x228, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x7, 0x4, 0x5, 0x4, 0x30, 0x4, [@loopback, @rand_addr="d0ecdaecec08b281521947012ff02663", @rand_addr="66f06a64004fc730cdf92c77bfbceab0", @loopback, @ipv4={[], [], @multicast2}, @mcast1, @rand_addr="2fa10ac752016ed70ef97d171a8ce69c", @dev={0xfe, 0x80, [], 0x12}, @dev={0xfe, 0x80, [], 0x10}, @mcast1, @remote, @ipv4={[], [], @empty}, @rand_addr="fe3321b905a21626a469c617056cfcca", @dev={0xfe, 0x80, [], 0x27}, @rand_addr="e22622d9490e651e57da86cef232ce27", @dev={0xfe, 0x80, [], 0x29}], 0xc}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5e0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x9}, 0x2c) 20:36:13 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000040)='system_u:object_r:dmesg_exec_t:s0\x00', 0x32d) r1 = socket$inet6(0xa, 0xfffffffffebffffe, 0xffff) connect$inet6(r1, 0x0, 0x0) 20:36:13 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0xfffffffffffffffe) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000440)={0x2, 0x3ffffffffffffffe, @broadcast}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000380)='./file0/file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x4e22}, {0x2, 0x4e1f, @loopback}, {0x2, 0x4e25, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x17d, 0x8, 0x5, 0x46a, 0x0, 0x0, 0x0, 0x1}) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x5d) sendmmsg(r0, &(0x7f0000000500), 0x0, 0x0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000a40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000880)=0x2dc) setxattr$security_capability(&(0x7f0000000a80)='./file0/file0\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f0000000800)=@v3={0x3000000, [{0x1, 0x5}, {0xfffffffffffffffe, 0x6}], r5}, 0xffffffffffffff26, 0x2) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000c00)={'filter\x00'}, &(0x7f0000000480)=0x78) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000780)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000000640)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0x6dc6c3f4be725fae, &(0x7f00000005c0)={&(0x7f0000000680)=ANY=[@ANYRESOCT], 0x1}, 0x1, 0x0, 0x0, 0x10000000040000}, 0x0) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f0000000180)=0x1ff) timer_create(0x3, &(0x7f0000000840)={0x0, 0x100029, 0x1, @tid=r6}, &(0x7f0000000240)=0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) timer_settime(r7, 0x1, &(0x7f00000002c0)={{0x77359400}, {r8, r9+30000000}}, &(0x7f0000000300)) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000007c0)=""/36) openat$uhid(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/uhid\x00', 0x802, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1e, 0x8031, 0xffffffffffffffff, 0x0) mprotect(&(0x7f00003a3000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 20:36:13 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000000)=0x2) 20:36:13 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x141740, 0x0) getsockopt$inet6_buf(r0, 0x29, 0xd6, &(0x7f0000000840)=""/4096, &(0x7f0000000100)=0x1000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x100000000000003, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000004500)={'syz_tun\x00', 0x0}) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup(r4, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="32cae4783d32"}, 0x14) sendto$inet6(r2, &(0x7f00000007c0)="050300000300000000000000c52cf7c21975e697b02f00066b2b2ff0dac8897c6b11876d886b6621d8d217ccd51cc5471d130a6632a88161a6fd8f24286a07d057c3be255b3f142fdd95208f", 0x4c, 0x0, 0x0, 0x0) 20:36:14 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4051020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, 0x11, 0x2, 0x0, 0x70bd2c, 0x25dfdbff, {0x2, 0x0, 0x6}, [@nested={0x20, 0x24, [@typed={0x8, 0x79, @str=')\x00'}, @typed={0x10, 0x56, @str=']selinux\xff\x00'}, @typed={0x4, 0x3a}]}, @typed={0x8, 0x54, @ipv4=@rand_addr=0x15a686e9}, @typed={0xc, 0x4d, @str='syscall\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008091) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 20:36:14 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, 0x0) write$selinux_load(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000402c000000002315c908e62da2987ab4a993e15d031da8c2433bb66697bce06294fe5e96a1504b87146b18e4ea823343182ad8479954c11ea393a8264b48bee115a5a1846bbc862cfa427bdbbf4b20ac55d8e2ca3a5fb5ef3de30de396e206fea0c3bd40f85602299810a60f4f6fcd5d60b618c342d41cfd585f6fc3a929e3ac94d51a276ce9e4457a12d2dddfb238390d6b7c0795754fc6f13508cb14a66b9c"], 0x63) setxattr$security_smack_entry(0x0, 0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00', 0x46, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() creat(&(0x7f0000000080)='./bus\x00', 0xc1) stat(0x0, &(0x7f0000001f00)) lstat(&(0x7f0000000380)='./bus\x00', 0x0) stat(0x0, &(0x7f0000002080)) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x20000000) creat(0x0, 0x100) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="e7d6ce6442c568a1aa614b27a45fb8cbc4c8541f4ceed708c079416142c3d1bd5826d978292ce6fc9e0cf92db7280bbfced06227734b5ec553e9df1daa306ca6064dd6a6f842f770535aa5a74e94c60df3bcbbe1706e486f522598602970c1454ea1b7f95ae9021b20ba2f3ded1a03005067fec818f781ccdb871c545ad0fdc198d05193b298999d7c1e70967bca44453aa9a196b38783745ababca39217b7d7488f4b29bffa5cb823a21a4d6b9b1a158a5c8882a03761fb142ce879d1ec2a572c13ff7c6c71d4d4d65434d0909050660884fcb574bab0cb622f25f27aebd867dfca14ff01000004d3300c"], 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000900)=0x9) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/239) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000500), 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) [ 2368.485727] SELinux: failed to load policy [ 2368.525720] SELinux: failed to load policy 20:36:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x108, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f00000000c0)=@ethtool_flash={0x33, 0x0, "8a8985ecbd5bcbaece44a6f8d07d7a5e6591fa09ff281fb766e8a1da9dd48953bff820cf4175c81d2a75cac919e11c10a59f9c7fc50981293f99f72e8b8bcd3e20b66e333997cab7358bbe62ab1bd67cd2b461f99c8f0bdc6bcb0a40fd473793b349091d564c2cec6a6af34747c43dd048054bd1b2d4496a5ac3e4f70938fedd"}}) 20:36:14 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000000140), 0x2c) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U-', 0x8000}, 0x28, 0x3) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3, 0x101001) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x7, 0x200) 20:36:14 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:15 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000000)={0x1, 0x8, 0x1}) sendto$inet(r1, &(0x7f0000000040), 0x0, 0x10, 0x0, 0x0) ioctl$TIOCSBRK(r1, 0x40044590) 20:36:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setflags(r0, 0x2, 0x1) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, 0x0, 0x0) ioctl$KDENABIO(r1, 0x4b36) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x4}, 0x3d) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') connect(r2, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 20:36:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000600)=ANY=[@ANYBLOB="0180c2001000004239ca4d0014000000880bb40000241ce5da9578ac101d0de0000001d16c6e68d49e11095bfef2776c0001000004010778504ffa50f6f434755965e5529968755d6c21016b1a5606c2b167ed000000000000002ab078de864cc2c3ee55c6ea5e1f9285"], 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x100, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x1, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x1, 0xc7, 0x8, 0x2]}, 0x5c) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000300)={'team0\x00', 0x43}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000cc0)=0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000480)=0x1, 0x4) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x40000000020087, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) clock_nanosleep(0x0, 0x1, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x806, 0x0) ioctl(r3, 0xc1, &(0x7f00000004c0)="da7d4b86c2818b75c47f9771d213aedc1cf42145619d6d4f3d64117bf61b5127ad7af6959693156c7711fe75eabf00799280241f1e5aad27d1f3ba517f4aadabeadf5f1953569ed70cee0b91162c85a0e14e7b79821c0ba0b136b09e") io_setup(0x4, &(0x7f0000000080)) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r5, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x2004c004) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f00000001c0)=0x200) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000340)) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000680)=@filter={'filter\x00', 0xe, 0x4, 0x580, 0x2b0, 0x1c0, 0x0, 0x0, 0x0, 0x500, 0x500, 0x500, 0x500, 0x500, 0x4, &(0x7f0000000140), {[{{@uncond, 0x0, 0x158, 0x198, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x3c, 0x101, 0x10000, 0x7, 0x0, @dev={0xfe, 0x80, [], 0x2a}, @empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xffffffff, 0xffffffff, 0xffffff00, 0xffffff00], [0xff, 0xff0000ff, 0xff, 0xffffffff], [0xff, 0xffffffff, 0xffffffff, 0xffffff00], 0x20, 0x208}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x7fffffff, 0x24, "795ca1f8f009f4b635fcabf92299592cc686f8d21e350894ddcf44ba26ef"}}}, {{@ipv6={@ipv4={[], [], @multicast1}, @empty, [0xff, 0xff000000, 0xff000000, 0xffffffff], [0xffffffff, 0xffffff00, 0xffffff00, 0xffffffff], 'syzkaller1\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x33, 0x8, 0x1, 0x2}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@ipv4={[], [], @multicast1}, @empty, [0xffffffff, 0xffffffff, 0xff0000ff, 0xff0000ff], [0xffffff00, 0xffffff00, 0x0, 0xffffff00], 'gretap0\x00', 'ip6tnl0\x00', {0xff}, {0xd0d226dc9926f54f}, 0x7f, 0x100, 0x1}, 0x0, 0x200, 0x228, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x7, 0x4, 0x5, 0x4, 0x30, 0x4, [@loopback, @rand_addr="d0ecdaecec08b281521947012ff02663", @rand_addr="66f06a64004fc730cdf92c77bfbceab0", @loopback, @ipv4={[], [], @multicast2}, @mcast1, @rand_addr="2fa10ac752016ed70ef97d171a8ce69c", @dev={0xfe, 0x80, [], 0x12}, @dev={0xfe, 0x80, [], 0x10}, @mcast1, @remote, @ipv4={[], [], @empty}, @rand_addr="fe3321b905a21626a469c617056cfcca", @dev={0xfe, 0x80, [], 0x27}, @rand_addr="e22622d9490e651e57da86cef232ce27", @dev={0xfe, 0x80, [], 0x29}], 0xc}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5e0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x9}, 0x2c) 20:36:15 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) socket$inet6(0xa, 0x2, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000000)=""/39) connect$inet6(r0, 0x0, 0x168) [ 2370.735454] kauditd_printk_skb: 155 callbacks suppressed [ 2370.735463] audit: type=1400 audit(1549744576.640:11031): avc: denied { map } for pid=13327 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2370.934424] audit: type=1400 audit(1549744576.840:11032): avc: denied { create } for pid=13244 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2370.958798] audit: type=1400 audit(1549744576.840:11033): avc: denied { write } for pid=13244 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:36:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000900)={'syzkaller0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x5, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) r2 = socket$packet(0x11, 0x808000000000003, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3, 0xfffffffffffffffc}, 0x4) recvmsg(r0, &(0x7f00000008c0)={&(0x7f0000000180)=@ax25={{0x3, @default}, [@rose, @rose, @rose, @default, @netrom, @default, @null, @bcast]}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000200)=""/181, 0xb5}, {&(0x7f00000002c0)=""/66, 0x42}, {&(0x7f0000000340)=""/119, 0x77}, {&(0x7f00000003c0)=""/192, 0xc0}, {&(0x7f0000000480)=""/208, 0xd0}, {&(0x7f0000000580)=""/200, 0xc8}, {&(0x7f0000000680)=""/196, 0xc4}, {&(0x7f0000000780)=""/102, 0x66}], 0x8, &(0x7f0000000880)=""/28, 0x2ac}, 0x10000) pipe(&(0x7f0000000940)={0xffffffffffffffff}) ioctl$KDSKBLED(r3, 0x4b65, 0x7) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000140)={0x17, 0x4f, &(0x7f0000000000)="fcc38f5261d69f051f0421bdd21e25d8c8c50408551df82b0bdc1830a292da9bca13372f3f720448249877e99fc1756139755b9e24afc7475423200a8814954ce2bc3a1f089f15f160740c2b05adc0"}) 20:36:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setflags(r0, 0x2, 0x1) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, 0x0, 0x0) ioctl$KDENABIO(r1, 0x4b36) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x4}, 0x3d) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') connect(r2, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 20:36:16 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x800000018, &(0x7f0000000380)=0x800, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x800}]}, 0x10) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x80, 0x0}, 0x8001) writev(r0, &(0x7f0000000280)=[{&(0x7f0000001540)="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", 0x7d1}], 0x1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) write$P9_RMKNOD(r2, &(0x7f0000000080)={0x14, 0x13, 0x2, {0x40, 0x0, 0x3}}, 0x14) 20:36:16 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="080007000000000040000100240001006c625f68616a785f737461747300000000000000000000000000000000000000080003000b00000008000400880600000800070000000000e4080013d6294e9f20a8e4a5fc3905a8e0f3a27c844f337a28328687ed809590422b35f676769e83271f054b56cef851b5c717fd668ac7a7433aadfb85788c64067fdb94dc570173a35f89e5078b4518334c88fccd36ae0f7d285f649db6802b0751d8781fcb58316a270e003f682083eaedbd685c0850b885cb2e105e8446f209f66569c9033f552e75a5fa27a150e50de7805a19de60ebbc4c5774afcd02e5a34862775965f6f4062622d32e801e6238e87a7087a801000000000000007fb279d4563da0533abf489d3c23cf9ad5f033d3e1e96b80f9f306efaa94e62107c26747531f34dd93fe1608b69ca25c744bbd7df31f5c7dfbb97163fda5d861bd81bb11399f66fb12a2da387a03f8dd33bee7cba7f724b16a5bcc48af8c23922cc1f5980a28dbe0297d0fe1fca55c6f70ed7fe074834596dbf62d19d7c903fa8fbb0969184af2542110293b580e756ec016a413d34d22d9dd36e5ec9fa29a2d8b34125bd435d5b762d963dd8a9f2136f2f937184b5229d72ba13655e29dc86391cc1489d2f176f80c7b8773824202e3e54c925cde75d638700ad40980e4b586c94fd1a354748241269d023ee23759b0b2dbf4e342200eb2bfab878ddebaf137a400979fac78e1d1443b806800000000b8bf7ccaacb724b1b2ddd74e6c75516efe74e189fef59fb06e900d721fded45458ef0e0aaa1814a2858bb36c4832a7520792ee4bca334528baf9003700000000000000f67f0276a139d423d5464bfa47fe0932bce55f6408dfaf5c295c50819549ff363a4b649bb8d55d8fe41ae9576caf7a32f14583eba73d3b9019bbd6cb1b4f5647cff6be2a2900000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:16 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/prev\x00') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0xfffffffffffffee9) ioctl$VT_RELDISP(r0, 0x5605) 20:36:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000600)=ANY=[@ANYBLOB="0180c2001000004239ca4d0014000000880bb40000241ce5da9578ac101d0de0000001d16c6e68d49e11095bfef2776c0001000004010778504ffa50f6f434755965e5529968755d6c21016b1a5606c2b167ed000000000000002ab078de864cc2c3ee55c6ea5e1f9285"], 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x100, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x1, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x1, 0xc7, 0x8, 0x2]}, 0x5c) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000300)={'team0\x00', 0x43}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000cc0)=0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000480)=0x1, 0x4) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x40000000020087, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) clock_nanosleep(0x0, 0x1, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x806, 0x0) ioctl(r3, 0xc1, &(0x7f00000004c0)="da7d4b86c2818b75c47f9771d213aedc1cf42145619d6d4f3d64117bf61b5127ad7af6959693156c7711fe75eabf00799280241f1e5aad27d1f3ba517f4aadabeadf5f1953569ed70cee0b91162c85a0e14e7b79821c0ba0b136b09e") io_setup(0x4, &(0x7f0000000080)) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r5, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x2004c004) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f00000001c0)=0x200) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000340)) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000680)=@filter={'filter\x00', 0xe, 0x4, 0x580, 0x2b0, 0x1c0, 0x0, 0x0, 0x0, 0x500, 0x500, 0x500, 0x500, 0x500, 0x4, &(0x7f0000000140), {[{{@uncond, 0x0, 0x158, 0x198, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x3c, 0x101, 0x10000, 0x7, 0x0, @dev={0xfe, 0x80, [], 0x2a}, @empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xffffffff, 0xffffffff, 0xffffff00, 0xffffff00], [0xff, 0xff0000ff, 0xff, 0xffffffff], [0xff, 0xffffffff, 0xffffffff, 0xffffff00], 0x20, 0x208}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x7fffffff, 0x24, "795ca1f8f009f4b635fcabf92299592cc686f8d21e350894ddcf44ba26ef"}}}, {{@ipv6={@ipv4={[], [], @multicast1}, @empty, [0xff, 0xff000000, 0xff000000, 0xffffffff], [0xffffffff, 0xffffff00, 0xffffff00, 0xffffffff], 'syzkaller1\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x33, 0x8, 0x1, 0x2}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@ipv4={[], [], @multicast1}, @empty, [0xffffffff, 0xffffffff, 0xff0000ff, 0xff0000ff], [0xffffff00, 0xffffff00, 0x0, 0xffffff00], 'gretap0\x00', 'ip6tnl0\x00', {0xff}, {0xd0d226dc9926f54f}, 0x7f, 0x100, 0x1}, 0x0, 0x200, 0x228, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x7, 0x4, 0x5, 0x4, 0x30, 0x4, [@loopback, @rand_addr="d0ecdaecec08b281521947012ff02663", @rand_addr="66f06a64004fc730cdf92c77bfbceab0", @loopback, @ipv4={[], [], @multicast2}, @mcast1, @rand_addr="2fa10ac752016ed70ef97d171a8ce69c", @dev={0xfe, 0x80, [], 0x12}, @dev={0xfe, 0x80, [], 0x10}, @mcast1, @remote, @ipv4={[], [], @empty}, @rand_addr="fe3321b905a21626a469c617056cfcca", @dev={0xfe, 0x80, [], 0x27}, @rand_addr="e22622d9490e651e57da86cef232ce27", @dev={0xfe, 0x80, [], 0x29}], 0xc}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5e0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x9}, 0x2c) [ 2370.984358] audit: type=1400 audit(1549744576.850:11034): avc: denied { map } for pid=13329 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2371.007022] audit: type=1400 audit(1549744576.850:11035): avc: denied { read } for pid=13244 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2371.055659] audit: type=1400 audit(1549744576.960:11036): avc: denied { create } for pid=13332 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 2371.105871] audit: type=1400 audit(1549744577.010:11037): avc: denied { map } for pid=13341 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2371.146754] audit: type=1400 audit(1549744577.030:11038): avc: denied { map } for pid=13341 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2371.231915] audit: type=1400 audit(1549744577.080:11039): avc: denied { map } for pid=13343 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2371.293117] audit: type=1400 audit(1549744577.080:11040): avc: denied { map } for pid=13343 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:36:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setflags(r0, 0x2, 0x1) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, 0x0, 0x0) ioctl$KDENABIO(r1, 0x4b36) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x4}, 0x3d) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') connect(r2, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 20:36:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0xfffffffffffffe38, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYPTR], 0x8}}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x68) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e1f, 0xfff, @remote}, 0xff90) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) 20:36:17 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$VT_ACTIVATE(r1, 0x5606, 0xce6) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x200001, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000140)={0x8, 0xff, 0x93d4, 0x8001, 0x3}, 0x14) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r3, 0x10e, 0xf, &(0x7f0000000040)=""/79, &(0x7f00000000c0)=0x4f) 20:36:17 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}, {}, {}, {}, {}], 0x5, 0x7f, &(0x7f00000000c0)={0x9}, 0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='cmdline\x00') getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1d, &(0x7f0000000180)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, r2}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 20:36:18 executing program 3: clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80000, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) r1 = gettid() io_setup(0x9, &(0x7f0000000140)=0x0) io_cancel(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x85, r0, &(0x7f0000000180)="07bde6a88669a71cd10ee72c0db72fd371bc5ef66d1e972f25d1831e2ce7cc85ef09ccc2750bc45527727f93c595da6eabb745070fba13f233bcdde0d8fa425d4e2b2cd348b2178fdb5b11312f879f464bcd714247e867be489e9a360402187d158f0a6b4cb7afae9b518525d843f76a0020b5c538fc7b9c608776a1dee3aa0a875928735dc033aa88b6fee103db219550381cf159f68b19bd657daf3d4cf61d497b3ac3455a1d139e7cf6e5f0bb439500b59da8b8a278c139fb67e72490fe9f3bb8f581fa7fed936d67447b1d70424ee65d42f12251986d30504737c31073c00242691911c4fcd23cf5c7f7aa0f36", 0xef, 0x2}, &(0x7f00000002c0)) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x54}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000000)=r1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x1f38, @empty, 0x5}, 0x1c) ptrace$cont(0x20, r1, 0x3ffffffffffc, 0x10) 20:36:18 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000580)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000380)=""/186, 0xfef6) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0xc7, 0x1, 0x5, "363a57882e3f4ae318ee00e74898a567", "2f621d2e3d2fb680a740e9ff2e3e3466cea5b48ea9c89e5ccbe39bb3449fed901575603ef38f931dfbd86d9c3557fbf1623f665e4932af112736810951873a1ed7f9acfc615afc03bb4bace2cdcb422562ad903c84d3ed4c18b6e20a34c24e110015e7215b73b55fcb6c104343403f1d9783b3255bc258f0652dc10b4203f730647636f14bce209580c5991a08a6e923018f67e93ee4f63df28d8fdb55d3c9b5866fd1233a1df445e328b2ccb80184aa28a2"}, 0xc7, 0x1) write(r0, &(0x7f0000000000)="eba423c9fc87680b5ca67214af775c1ebf354ef53add3c49ce212d5e3f4dc064facb15f6f25d68c1693686366332dd80b620f32341fa3a1b3e69fbc71279162255e0a0c4c227c35fd7334fc9ce9b258107f5459ac982979121931be71d8c5ff4365767a9d67f564ddd554dee6222a82e673bf2e073414278345029450497557727bbd3fab9d3", 0x86) 20:36:18 executing program 3: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) 20:36:18 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x6) getsockopt(r0, 0xff, 0x0, 0x0, &(0x7f0000000000)) r1 = dup2(r0, r0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000040)={{0x2, 0x4e21, @local}, {0x1}, 0x20, {0x2, 0x4e24, @multicast2}, 'caif0\x00'}) 20:36:18 executing program 0: futex(&(0x7f0000000000)=0xfffffffffffffffa, 0x80, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 20:36:23 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="080007000000000040000100240001006c625f68616a785f737461747300000000000000000000000000000000000000080003000b00000008000400880600000800070000000000e4080013d6294e9f20a8e4a5fc3905a8e0f3a27c844f337a28328687ed809590422b35f676769e83271f054b56cef851b5c717fd668ac7a7433aadfb85788c64067fdb94dc570173a35f89e5078b4518334c88fccd36ae0f7d285f649db6802b0751d8781fcb58316a270e003f682083eaedbd685c0850b885cb2e105e8446f209f66569c9033f552e75a5fa27a150e50de7805a19de60ebbc4c5774afcd02e5a34862775965f6f4062622d32e801e6238e87a7087a801000000000000007fb279d4563da0533abf489d3c23cf9ad5f033d3e1e96b80f9f306efaa94e62107c26747531f34dd93fe1608b69ca25c744bbd7df31f5c7dfbb97163fda5d861bd81bb11399f66fb12a2da387a03f8dd33bee7cba7f724b16a5bcc48af8c23922cc1f5980a28dbe0297d0fe1fca55c6f70ed7fe074834596dbf62d19d7c903fa8fbb0969184af2542110293b580e756ec016a413d34d22d9dd36e5ec9fa29a2d8b34125bd435d5b762d963dd8a9f2136f2f937184b5229d72ba13655e29dc86391cc1489d2f176f80c7b8773824202e3e54c925cde75d638700ad40980e4b586c94fd1a354748241269d023ee23759b0b2dbf4e342200eb2bfab878ddebaf137a400979fac78e1d1443b806800000000b8bf7ccaacb724b1b2ddd74e6c75516efe74e189fef59fb06e900d721fded45458ef0e0aaa1814a2858bb36c4832a7520792ee4bca334528baf9003700000000000000f67f0276a139d423d5464bfa47fe0932bce55f6408dfaf5c295c50819549ff363a4b649bb8d55d8fe41ae9576caf7a32f14583eba73d3b9019bbd6cb1b4f5647cff6be2a2900000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000600)) 20:36:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x0, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000600)=ANY=[@ANYBLOB="0180c2001000004239ca4d0014000000880bb40000241ce5da9578ac101d0de0000001d16c6e68d49e11095bfef2776c0001000004010778504ffa50f6f434755965e5529968755d6c21016b1a5606c2b167ed000000000000002ab078de864cc2c3ee55c6ea5e1f9285"], 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x100, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x1, @mcast2, 0xffffffffffffffbb}, {0xa, 0x4e21, 0xfffffffffffffff9, @dev={0xfe, 0x80, [], 0xc}, 0x1000}, 0x7, [0xfffffffffffffff9, 0x824d, 0x1, 0xc7, 0x8, 0x2]}, 0x5c) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000300)={'team0\x00', 0x43}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000cc0)=0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x8}, 0x28, 0x2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000480)=0x1, 0x4) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/keychord\x00', 0x40000000020087, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)=0x4) clone(0x70024100, &(0x7f00000001c0), 0x0, 0x0, 0x0) clock_nanosleep(0x0, 0x1, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x806, 0x0) ioctl(r3, 0xc1, &(0x7f00000004c0)="da7d4b86c2818b75c47f9771d213aedc1cf42145619d6d4f3d64117bf61b5127ad7af6959693156c7711fe75eabf00799280241f1e5aad27d1f3ba517f4aadabeadf5f1953569ed70cee0b91162c85a0e14e7b79821c0ba0b136b09e") io_setup(0x4, &(0x7f0000000080)) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r5, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x2004c004) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f00000001c0)=0x200) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000340)) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000680)=@filter={'filter\x00', 0xe, 0x4, 0x580, 0x2b0, 0x1c0, 0x0, 0x0, 0x0, 0x500, 0x500, 0x500, 0x500, 0x500, 0x4, &(0x7f0000000140), {[{{@uncond, 0x0, 0x158, 0x198, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x3c, 0x101, 0x10000, 0x7, 0x0, @dev={0xfe, 0x80, [], 0x2a}, @empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xffffffff, 0xffffffff, 0xffffff00, 0xffffff00], [0xff, 0xff0000ff, 0xff, 0xffffffff], [0xff, 0xffffffff, 0xffffffff, 0xffffff00], 0x20, 0x208}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x7fffffff, 0x24, "795ca1f8f009f4b635fcabf92299592cc686f8d21e350894ddcf44ba26ef"}}}, {{@ipv6={@ipv4={[], [], @multicast1}, @empty, [0xff, 0xff000000, 0xff000000, 0xffffffff], [0xffffffff, 0xffffff00, 0xffffff00, 0xffffffff], 'syzkaller1\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x33, 0x8, 0x1, 0x2}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@ipv4={[], [], @multicast1}, @empty, [0xffffffff, 0xffffffff, 0xff0000ff, 0xff0000ff], [0xffffff00, 0xffffff00, 0x0, 0xffffff00], 'gretap0\x00', 'ip6tnl0\x00', {0xff}, {0xd0d226dc9926f54f}, 0x7f, 0x100, 0x1}, 0x0, 0x200, 0x228, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x7, 0x4, 0x5, 0x4, 0x30, 0x4, [@loopback, @rand_addr="d0ecdaecec08b281521947012ff02663", @rand_addr="66f06a64004fc730cdf92c77bfbceab0", @loopback, @ipv4={[], [], @multicast2}, @mcast1, @rand_addr="2fa10ac752016ed70ef97d171a8ce69c", @dev={0xfe, 0x80, [], 0x12}, @dev={0xfe, 0x80, [], 0x10}, @mcast1, @remote, @ipv4={[], [], @empty}, @rand_addr="fe3321b905a21626a469c617056cfcca", @dev={0xfe, 0x80, [], 0x27}, @rand_addr="e22622d9490e651e57da86cef232ce27", @dev={0xfe, 0x80, [], 0x29}], 0xc}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5e0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x9}, 0x2c) 20:36:23 executing program 3: sendto(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), 0x0) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sched_setaffinity(0x0, 0x6, &(0x7f00000003c0)=0x9) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigpending(0x0, 0x0) set_tid_address(&(0x7f0000000100)) r0 = syz_open_dev$evdev(0x0, 0x0, 0x101001) write$evdev(r0, &(0x7f00006f7fe8)=[{}], 0xfdd0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0xc0000, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x8) getpgrp(0x0) clock_gettime(0x0, 0x0) 20:36:23 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1e(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8c\x80\x00\x00\x00\x00\x00\x00\x00\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\fT\xb9\xeb\xf8\xe8/\x00\x04\x00\x00\x00\x00\x00\x00C\x94\x92\x92,\xb68\xe3\x90\x9b\x00zB>\xe5\x18\x87|+\f4-Z\b\xf0;\x99\xcc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') write$selinux_context(r1, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r2 = socket$inet6(0xa, 0x4, 0x5c) connect$inet6(r2, 0x0, 0x0) 20:36:23 executing program 0: lsetxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x1) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x101000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1f, 0x7, 0x0, 0x9, 0x0, r0, 0x9b5}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) r2 = getegid() ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000080)=0x40) chown(&(0x7f0000000040)='./file0\x00', r1, r2) [ 2377.383332] kauditd_printk_skb: 32 callbacks suppressed [ 2377.383340] audit: type=1400 audit(1549744583.290:11073): avc: denied { map } for pid=13411 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2377.462691] audit: type=1400 audit(1549744583.320:11074): avc: denied { map } for pid=13411 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:36:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000240)=@nfc={0x27, 0x1, 0x1000000}, 0x80, 0x0}}], 0x40000000000016b, 0x0) socketpair(0x8, 0x0, 0x15a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000001c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, r2, 0xc00, 0x70bd25, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x90}, 0x40800) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) write$P9_RATTACH(r3, &(0x7f00000000c0)={0x14, 0x69, 0x1, {0x44, 0x1}}, 0x14) ioctl$BLKGETSIZE64(r3, 0x80081272, &(0x7f0000000040)) [ 2377.582639] audit: type=1400 audit(1549744583.320:11075): avc: denied { map } for pid=13411 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2377.646616] audit: type=1400 audit(1549744583.320:11076): avc: denied { map } for pid=13411 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2377.741360] audit: type=1400 audit(1549744583.340:11077): avc: denied { map } for pid=13412 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2377.777371] audit: type=1400 audit(1549744583.400:11078): avc: denied { create } for pid=13406 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2377.805667] audit: type=1400 audit(1549744583.400:11079): avc: denied { write } for pid=13406 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2377.831740] audit: type=1400 audit(1549744583.410:11080): avc: denied { map } for pid=13420 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2377.855675] audit: type=1400 audit(1549744583.420:11082): avc: denied { map } for pid=13419 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2377.881268] audit: type=1400 audit(1549744583.420:11081): avc: denied { create } for pid=13410 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:36:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in6, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) r1 = accept4(0xffffffffffffffff, &(0x7f00000004c0)=@nl=@unspec, &(0x7f00000002c0)=0x80, 0x801) bind$unix(r1, &(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000400)=0xe8) quotactl(0xe481, 0x0, r0, 0x0) sendmmsg(r1, 0x0, 0x0, 0x43) 20:36:23 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000d67000)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in, 0x0, 0x3c}, 0x0, @in6=@mcast1}}, 0xe8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) fcntl$setown(r0, 0x8, r1) connect(r0, &(0x7f0000000100)=@tipc=@name={0x1e, 0x2, 0x1, {{0x41}, 0x4}}, 0x80) 20:36:23 executing program 2: socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) 20:36:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000380)="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", 0x102, 0x400}], 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x440000, 0x18) ioctl$KDDELIO(r1, 0x4b35, 0xffffffff) 20:36:24 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x10080, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x6000000) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) pipe2(0x0, 0x4000) socket$unix(0x1, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r0, r1) write$UHID_CREATE(r3, &(0x7f0000000480)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f00000001c0)=""/152, 0x98, 0x300000000000, 0x1000, 0x2, 0x8, 0x23d51733}, 0x120) preadv(r2, &(0x7f0000001380)=[{&(0x7f00000014c0)=""/148, 0x94}], 0x1, 0x0) socket(0x11, 0x80800, 0x20) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/fib_triestat\x00') preadv(r4, &(0x7f0000000480), 0x1000000000000268, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xfffffffe) r5 = creat(0x0, 0x0) inotify_init() setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r5, 0x10e, 0x2, &(0x7f00000000c0)=0x10, 0x4) getsockname$unix(r2, &(0x7f0000000400)=@abs, &(0x7f0000000180)=0x6e) syz_genetlink_get_family_id$ipvs(0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000080)="3b7385c5477aada8b4f9ad0e95c794ed736b7a1a58bac8f3f598") [ 2378.297012] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 2378.318830] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (f4501008) 20:36:25 executing program 2: socketpair$unix(0x1, 0x40400000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xffffffea) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:36:25 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="080007000000000040000100240001006c625f68616a785f737461747300000000000000000000000000000000000000080003000b00000008000400880600000800070000000000e4080013d6294e9f20a8e4a5fc3905a8e0f3a27c844f337a28328687ed809590422b35f676769e83271f054b56cef851b5c717fd668ac7a7433aadfb85788c64067fdb94dc570173a35f89e5078b4518334c88fccd36ae0f7d285f649db6802b0751d8781fcb58316a270e003f682083eaedbd685c0850b885cb2e105e8446f209f66569c9033f552e75a5fa27a150e50de7805a19de60ebbc4c5774afcd02e5a34862775965f6f4062622d32e801e6238e87a7087a801000000000000007fb279d4563da0533abf489d3c23cf9ad5f033d3e1e96b80f9f306efaa94e62107c26747531f34dd93fe1608b69ca25c744bbd7df31f5c7dfbb97163fda5d861bd81bb11399f66fb12a2da387a03f8dd33bee7cba7f724b16a5bcc48af8c23922cc1f5980a28dbe0297d0fe1fca55c6f70ed7fe074834596dbf62d19d7c903fa8fbb0969184af2542110293b580e756ec016a413d34d22d9dd36e5ec9fa29a2d8b34125bd435d5b762d963dd8a9f2136f2f937184b5229d72ba13655e29dc86391cc1489d2f176f80c7b8773824202e3e54c925cde75d638700ad40980e4b586c94fd1a354748241269d023ee23759b0b2dbf4e342200eb2bfab878ddebaf137a400979fac78e1d1443b806800000000b8bf7ccaacb724b1b2ddd74e6c75516efe74e189fef59fb06e900d721fded45458ef0e0aaa1814a2858bb36c4832a7520792ee4bca334528baf9003700000000000000f67f0276a139d423d5464bfa47fe0932bce55f6408dfaf5c295c50819549ff363a4b649bb8d55d8fe41ae9576caf7a32f14583eba73d3b9019bbd6cb1b4f5647cff6be2a2900000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @remote, @initdev}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) pipe(0x0) 20:36:25 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="bf7caaaaaaaaaa8aaaaab20086dd602104cb474df7223646590100000000000000000000262a26"], 0x0) r0 = socket(0x6, 0xbd20f69b76b1a4ea, 0x10001) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'veth1_to_team\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="db5f194f896148acb391cc81ff18ff1e3950b4e28bbc5d91ff260f33074a35749b84ea90e729ff00000000524e000000ff000600000000000000000000"]}) setsockopt$inet_int(r0, 0x0, 0x40040, &(0x7f0000000100), 0x4) 20:36:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x80002, 0xfce) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000700)) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) bind$unix(r0, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x4, &(0x7f00000003c0)=[{&(0x7f00000001c0)="c568e2892d616fabe09ee7e57e4e0fb95578cfcb095f3c5c759d4941216e84b558db40043abb2aa08b8e9d1bda87cdc4159827a2783a347c29073ca30e8fe8d31ab6147bf9a23fe1e8debb20df82bd4c961f9ca1cb0d9126fc1b27d4a121b04a64852099c31397c7a0b66c2d229fb61bde77d7736cc87f178bae4a1453a413af852bdab85765fbd4fde202a8d71ba2523e51acb2cba675317bf97f40b012201b22dc645564dd6f15212e142421807219183b48d28747a839cd8a91ac238521897c6cf081", 0xc4, 0x8001}, {&(0x7f0000000080)="b918d98ba4fc7d21c5508a0454c83fc4534cf5cdee14003f44253b02af9354ac8c59cfc5b6f1ac9064b82d0455a01b1b6c6e0f5998683df049dc1bbda842640375bdbbc96b5ff67d89771d1d714ad0873acf0613a2f6935babaa66910c3cc1d0b91bd414aab9d2ab56f04fb5cd5ac60500b06f5d853b09f511", 0x79, 0x1}, {&(0x7f00000002c0)="8f769f1001d8d4431b7eb0d10289dd2f013eacb6d0b66802315622da6929440852bda01e44440708a1d46455b06d2b59eb01b792103569294b5e603eb01078a53471ac01a6c82bbf88f121ca2963a15927b8837e82f62bac6c10dc2ecec4e32c8666d9071bc5932955e4b7727585f567b5120545", 0x74, 0x3f}, {&(0x7f0000000100)="6fa9339fb12dbdaac6f87262", 0xc, 0x4}], 0x2000000, &(0x7f0000000540)={[{@nodots='nodots'}, {@nodots='nodots'}, {@dots='dots'}, {@fat=@codepage={'codepage', 0x3d, '874'}}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@smackfsfloor={'smackfsfloor'}}, {@euid_eq={'euid', 0x3d, r2}}, {@smackfsdef={'smackfsdef', 0x3d, 'attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f'}}, {@context={'context', 0x3d, 'system_u'}}, {@euid_eq={'euid', 0x3d, r3}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000640)={0xb, 0x6, 0x1}) connect$inet6(r1, 0x0, 0x0) 20:36:25 executing program 3: r0 = socket(0x1, 0x3, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000040)={0xaec6, {{0xa, 0x4e23, 0x8, @mcast1}}, 0x0, 0x5, [{{0xa, 0x4e21, 0xfffffffffffffffc, @local, 0x2}}, {{0xa, 0x4e23, 0x2f95, @local, 0x6}}, {{0xa, 0x4e22, 0x10001, @mcast2, 0xffffffffffff0001}}, {{0xa, 0x4e21, 0x6, @rand_addr="9c9692c2874ce2b79aad0ae34143a190", 0x3a24}}, {{0xa, 0x4e21, 0x2, @remote, 0x8}}]}, 0x310) 20:36:25 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x3f, 0x9, 0x9, 0x0, 0x1}, 0x2c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket(0x10, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountstats\x00') dup2(r1, r2) getdents64(r2, &(0x7f00000000c0)=""/247, 0xf7) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r0}, 0x2c) 20:36:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0xa35) read(r0, &(0x7f00003fefff)=""/1, 0x1) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x2102005ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(r2, r0, 0x0, 0x1) exit(0x0) readv(r0, &(0x7f0000dcdff0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3a) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fb9000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0xfffffffffffffff8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) tkill(r1, 0x16) 20:36:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x7ffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74da, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) 20:36:25 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') r2 = dup2(r0, r1) ioctl$TIOCSTI(r2, 0x5412, 0x3800000000000) 20:36:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x90100, 0x0) fcntl$setstatus(r0, 0x4, 0x800) getsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f0000001080)=""/4096, &(0x7f0000001040)=0x1000) setsockopt$inet_int(r0, 0x0, 0x32, 0x0, 0x0) 20:36:25 executing program 3: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000340)={0x38}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x200000, 0xfffffffffffffd83) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000480)={@rand_addr="cbfa3a67d7f6997c4f48a59b49cd53a7", 0x5, 0x1, 0xff, 0x3, 0x6}, 0x20) ioctl$FICLONE(r2, 0x40049409, r1) 20:36:25 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000200)='tracefs\x00', 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) getsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f00000001c0)={@initdev, @multicast1, @multicast2}, &(0x7f0000000440)=0xc) chdir(0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'ip6_vti0\x00'}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000000c0)={'vet\b\x00\x00\x01\x00_veam\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r3 = socket$inet(0x2, 0x3fffffffffffffff, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000300)="80a18432b8c6939cf32780487d415985a2a492bfe64bd1edf18bebc0f85be01145022b79102d6cd2b96c5f558237a66e82f27db0052e20fd69c00a256a5fa92d2e2a70837f985c7c3509b7fb1349dcfb76d2d37cf5439102af2b988b8a5fb2d96c847f91a0e4638f077650f71c69637b1623821d7e8f264232e95601aa54040e1b891e6cbfdeb253d78c28159e000f3f0a22f5b57def7d532d", 0x99, r3}, 0x68) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@local, 0x77}) shutdown(r3, 0x7ffffe) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000140)="03e62a3ed19ef1b4caea2ce67f651edbf51254e740c2fc00cbfc5fff6e3e83aceceecd500669c72313e7f4ef50242953cd38", 0x32, r1}, 0x68) 20:36:26 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="080007000000000040000100240001006c625f68616a785f737461747300000000000000000000000000000000000000080003000b00000008000400880600000800070000000000e4080013d6294e9f20a8e4a5fc3905a8e0f3a27c844f337a28328687ed809590422b35f676769e83271f054b56cef851b5c717fd668ac7a7433aadfb85788c64067fdb94dc570173a35f89e5078b4518334c88fccd36ae0f7d285f649db6802b0751d8781fcb58316a270e003f682083eaedbd685c0850b885cb2e105e8446f209f66569c9033f552e75a5fa27a150e50de7805a19de60ebbc4c5774afcd02e5a34862775965f6f4062622d32e801e6238e87a7087a801000000000000007fb279d4563da0533abf489d3c23cf9ad5f033d3e1e96b80f9f306efaa94e62107c26747531f34dd93fe1608b69ca25c744bbd7df31f5c7dfbb97163fda5d861bd81bb11399f66fb12a2da387a03f8dd33bee7cba7f724b16a5bcc48af8c23922cc1f5980a28dbe0297d0fe1fca55c6f70ed7fe074834596dbf62d19d7c903fa8fbb0969184af2542110293b580e756ec016a413d34d22d9dd36e5ec9fa29a2d8b34125bd435d5b762d963dd8a9f2136f2f937184b5229d72ba13655e29dc86391cc1489d2f176f80c7b8773824202e3e54c925cde75d638700ad40980e4b586c94fd1a354748241269d023ee23759b0b2dbf4e342200eb2bfab878ddebaf137a400979fac78e1d1443b806800000000b8bf7ccaacb724b1b2ddd74e6c75516efe74e189fef59fb06e900d721fded45458ef0e0aaa1814a2858bb36c4832a7520792ee4bca334528baf9003700000000000000f67f0276a139d423d5464bfa47fe0932bce55f6408dfaf5c295c50819549ff363a4b649bb8d55d8fe41ae9576caf7a32f14583eba73d3b9019bbd6cb1b4f5647cff6be2a2900000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:26 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000200)='tracefs\x00', 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) getsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f00000001c0)={@initdev, @multicast1, @multicast2}, &(0x7f0000000440)=0xc) chdir(0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'ip6_vti0\x00'}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000000c0)={'vet\b\x00\x00\x01\x00_veam\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r3 = socket$inet(0x2, 0x3fffffffffffffff, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000300)="80a18432b8c6939cf32780487d415985a2a492bfe64bd1edf18bebc0f85be01145022b79102d6cd2b96c5f558237a66e82f27db0052e20fd69c00a256a5fa92d2e2a70837f985c7c3509b7fb1349dcfb76d2d37cf5439102af2b988b8a5fb2d96c847f91a0e4638f077650f71c69637b1623821d7e8f264232e95601aa54040e1b891e6cbfdeb253d78c28159e000f3f0a22f5b57def7d532d", 0x99, r3}, 0x68) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@local, 0x77}) shutdown(r3, 0x7ffffe) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000140)="03e62a3ed19ef1b4caea2ce67f651edbf51254e740c2fc00cbfc5fff6e3e83aceceecd500669c72313e7f4ef50242953cd38", 0x32, r1}, 0x68) 20:36:26 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x204000, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x7) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x8000000000000000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8280, 0x0) write$selinux_context(r1, &(0x7f00000001c0)='system_u:object_r:mqueue_spool_t:s0\x00', 0x24) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 20:36:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r3) setresuid(0x0, r2, 0x0) setresgid(0x0, r3, r3) 20:36:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000000)={'nat\x00', 0x2, [{}, {}]}, 0x48) 20:36:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000100)) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f00000000c0)=0x400, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x33ed3c38}, 0xfffffffffffffcc2) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 20:36:26 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffd) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000240)=""/221, &(0x7f0000000340)=0xdd) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)='fd\x00') getdents(r2, &(0x7f0000000780)=""/4096, 0x1000) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1e, 0x4, "2dd2819c0e1bc1931d96885febf71f07fa0eae96822f11a2416b58bec95812708cf80bca2dfaf4df149ef1f8eec65d5270904ca9c339b7318a7d12ddf0bea86c", "dba5db6ba3e492e59ebdc5622d1601b8bfb053cb8d3f3e5668b5178ce737f10b", [0xf36, 0x1f]}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) write$P9_RLERROR(r0, &(0x7f0000000040)=ANY=[], 0x3c4) ioctl$TUNSETLINK(r0, 0x400454cd, 0x33f) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) 20:36:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_aout(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="bac599547c"], 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/checkreqprot\x00', 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000540)={0x0}, &(0x7f0000000580)=0xc) write$P9_RGETLOCK(r3, &(0x7f00000005c0)={0x3a, 0x37, 0x2, {0x2, 0xa, 0x2, r4, 0x1c, 'ppp1[@GPLself{*bdev{trusted['}}, 0x3a) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$RNDZAPENTCNT(r5, 0x5204, &(0x7f0000000180)=0x80) clone(0x800000001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statx(r5, &(0x7f0000000200)='./file0\x00', 0x800, 0xfff, &(0x7f0000000240)) setpriority(0x2, 0x0, 0x800000000000e6) getsockopt$EBT_SO_GET_INIT_ENTRIES(r5, 0x0, 0x83, &(0x7f0000000440)={'nat\x00', 0x0, 0x0, 0x63, [], 0x0, 0x0, &(0x7f00000003c0)=""/99}, &(0x7f00000004c0)=0x78) ioctl$TCSETSF(r5, 0x5404, &(0x7f00000001c0)={0x5, 0x3, 0x0, 0x6, 0x3, 0x7fffffff, 0x7fff, 0x5, 0x2877, 0x1, 0x3, 0x3ff}) write$apparmor_current(r5, &(0x7f0000000640)=@hat={'permhat ', 0x2, 0x5e, ['/selinux/avc/cache_threshold\x00', ',vmnet0vmnet1keyring\x00', '&\x9fGPL(\x00', '#vmnet0\x00', 'ppp1[@GPLself{*bdev{trusted[']}, 0x78) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0x7) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) finit_module(r3, &(0x7f0000000340)='/selinux/avc/cache_threshold\x00', 0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 20:36:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pause() socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x4001, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) write$P9_RMKNOD(r1, &(0x7f0000000080)={0x14, 0x13, 0x5, {0x1, 0x3, 0x2}}, 0x14) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:36:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getlink={0x38, 0x12, 0x631, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x1002, 0x1000}, [@IFLA_PROMISCUITY={0x8, 0x1e, 0x6}, @IFLA_GROUP={0x8, 0x1b, 0x100}, @IFLA_CARRIER={0x8, 0x21, 0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x10) connect$inet6(r1, 0x0, 0xfffffffffffffd44) 20:36:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) openat$pfkey(0xffffffffffffff9c, 0x0, 0x10000000509240, 0x0) 20:36:26 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x401) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f00000000c0)=""/153) vmsplice(r2, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) 20:36:33 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) openat$pfkey(0xffffffffffffff9c, 0x0, 0x10000000509240, 0x0) 20:36:33 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001cc0)={'ifb0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000001d00)={@loopback, r1}, 0x14) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r2, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r3 = socket$inet6(0xa, 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x9, 0x80000) connect$inet6(r3, 0x0, 0x0) 20:36:33 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000100)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x6c, 0x0, @ipv4={[0x0, 0xd], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0xfffffffffffffff9}, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1f, 0x3, 0x3f, 0x3f, 0x8, 0xffffffffffffffff, 0x400}, 0x2c) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000180)=ANY=[@ANYBLOB="1dd100000000000001040000000000000100000000004000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x2, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)=0x100) 20:36:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x7) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x40000000000029f, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) r6 = gettid() getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000480)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) fstat(r2, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = gettid() lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700), &(0x7f0000000740)=0x0, &(0x7f0000000780)) r13 = getpgrp(0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0}, &(0x7f0000000800)=0xc) getresgid(&(0x7f0000000840)=0x0, &(0x7f0000000880), &(0x7f00000008c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000940)={0xffffffffffffffff, r4, 0x0, 0x6, &(0x7f0000000900)='#self\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000a80)=0xe8) r18 = getegid() sendmmsg$unix(r4, &(0x7f0000000b80)=[{&(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f00000002c0)="3eaeac4469f35e054fa4cfce88e65b404c9d8997d07e36fabdac26c2c51a74d7b214c696a59f959fdae63081653f8cba5ed35c113e027d73c1ceba8f619221e96e367c3a73efdfc5b8bd7d3ed3d4e2e15e03476240f8eb8a09eb4b53f8ca12145f4f48719cb427a64f04bff39196c731e2bb", 0x72}, {&(0x7f0000000340)}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="5e904114d899f16745da85a0d15769784e02adc2798f3da3d48a2f3cef80f942463a6fb041dd65d276edbc5cc472ff76902e146336e47074b91a8f3bbc384b15e8e5da509b5d63b17ce6321d22013e897872253080a820aa23d62cbe68c4316c91ffa9a49ce60754a8", 0x69}], 0x4, &(0x7f0000000ac0)=[@cred={0x20, 0x1, 0x2, r6, r7, r8}, @rights={0x28, 0x1, 0x1, [r9, r3, r0, r1, r3]}, @rights={0x18, 0x1, 0x1, [r2]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}], 0xc0, 0x10}], 0x1, 0x40084) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) 20:36:33 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0xd000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') ioctl$FIONREAD(r0, 0x541b, &(0x7f00000001c0)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000400)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1:q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\x00\xef\xc7@\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ\x1d\xbbv\xbc}0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:41 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x81) connect$inet6(r1, 0x0, 0x0) 20:36:41 executing program 3: syz_emit_ethernet(0x2d2, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe0000000000000000000d00000000aafe8000000000000000000000000000aa000000008214ab4809e709e828aa9edd38db72fd196514f4fd3ec488a1a6bd9b9a08cc32", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) 20:36:41 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) open$dir(0x0, 0x2840, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000040)=""/113) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000740)={0x7, 0x101, 0x9, 0x9, 0x8}) preadv(r2, &(0x7f0000000480), 0x2000000000000113, 0x0) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f0000000640)=[{&(0x7f0000000300)="4faf9f528908cc0e6a8aaa9de91cf5671c5dfe30f07342a676a8df4637d66e6614441edb59538b3f5455379bacc406444c1676db8a74b9f0f246e96a490c068ee5b9aa351ec6e548234991bef13cf4996722d141384c398c796f29395a1c36ad301f007125b5cb0f2d585dbd0edef85b592960ef3271c3e04c9a45cb5b7266cfdecfbeb35aa03e9468133a5471b3d46c18235fa5f84375a91755a33bb95bf09870691b2a0e2a87285fa490c3659e5a8b7b14fc11dd3e799e2679ede87399fee458ff1ce2579824ce59a8af9e875763dec72790f5a1050a29e2784d4745e2ad9c43bf09e99008b1ddd2a3037677cae380", 0xf0, 0x8}], 0x1000, &(0x7f0000000680)={[{@dots='dots'}, {@fat=@showexec='showexec'}, {@nodots='nodots'}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}, {@dots='dots'}], [{@seclabel='seclabel'}, {@dont_measure='dont_measure'}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'system_u'}}, {@appraise='appraise'}, {@hash='hash'}, {@dont_measure='dont_measure'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@subj_user={'subj_user', 0x3d, 'net/snmp\x00'}}]}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000004e22000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000140)={0x3, 0x3f}) 20:36:41 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001540)='./file0\x00', &(0x7f0000000200)='hostfs\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000005740)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) getpriority(0x2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r4, 0x10e, 0x3, &(0x7f0000000100)=""/225, &(0x7f0000000000)=0xe1) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) unshare(0x24020400) lseek(r3, 0x0, 0x0) [ 2395.541906] kauditd_printk_skb: 17 callbacks suppressed [ 2395.541915] audit: type=1400 audit(1549744601.450:11214): avc: denied { map } for pid=13674 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:36:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000180)=0xe8) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x1000000000000006, &(0x7f0000000140)=0x32, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x8400, 0x0) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0xfffffffffffffd36) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000000)={0x100000001, 0x3, 0xfffffffffffffffd}) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r5 = request_key(&(0x7f0000000400)='blacklist\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)='/dev/null\x00', 0xfffffffffffffff8) keyctl$negate(0xd, r4, 0x5, r5) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) sendmmsg(r0, &(0x7f0000008200)=[{{&(0x7f00000004c0)=@llc={0x1a, 0x321, 0x10001, 0xfffffffffffffffa, 0x2, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000001940)=[{&(0x7f0000000540)="5ae5b7b928e64dfb218c9a949fe4fc90f643086174a8f9165fd82ad6c4057e7e3d96f197253e2c7f52ab1db779b3c62b1c7adc113b744ddb9fb1686d0f6d8c2be69be1320f54824b27b383d87a61be05faed57fad314828d6262984f41add7af85f29fddbbaaa0d3300fefa3feb2eda33a556c0ee9aac5c47fd8586512c8e185f5bc6cb71b5542817db687cf1fb2b67d6a6e770fe72338fe94277fd579fbd986283960322ee42aceb0856fe6406456dd946c58919225a3ea92d43ae125a88b1f0610ee64b1", 0xc5}, {&(0x7f0000000640)="1ab8123296695ba604cb70265e1422a0eba9b7e82841f115a01d891525b9679b38c151ccce77fe97f019300490b59a4bc719ed790e33", 0x36}, {&(0x7f0000000680)="4eeb83081465b53e4317722db9cca2607d97720c41aa69fecd60f036157eca7234f889a80eaa53d05c401e188c99d872760ec9539d98d36a7a7fef1a6782ac9fdb0a4a57f7d58c84ffd31c8e91813773ef82ea1b38ff20295f8ff6d693c6d3faf72b1b8275ba3f28fc6a6481aa0287c6cc7c80a7888065becb66a12ba056f55a1b0f383b1a26a0002e8001c0d01d7ebc832fdb3212d404e73adbbfc80c9ee3", 0x9f}, {&(0x7f0000000740)="48013cedaa005f641ad7a5cc38e46674534568b9eaf27171f6c3bb14f440b839070e8bc94dc436a4693b96ef23c4e7fdae08ed27fab161dcab4dde20d5972f21369a9b29c04415b356f26338bfea4b3a6e111ae87c72b45abb316b5606b243615f420997fd5b9f721e3b113fe9d7ac62d04493662f27143df115a8aeb623c6b35d8cafa2df21b6a1db96db4a0a2ae93adfecaacd4faef85b93a5f6bd8bc3a8c45e3a017c3855db422418e5cea095c05c1448da580a565d9ce351a856db1d2ba8aad1693320acc3f42edad324bd160258a0c47c8b1a1853d32f69ff293f1eb864a1bfd308d210db83e054f2cb7370372c4bac89f6c552699c90", 0xf9}, {&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000001840)="79ad5ebda8647f708f272f122dd6b06317edbbc93f5ce8336a47767fb3329a6f1bb7fe1175b71ab91aa402d76b9363ec548f53e3c05a17c340a9f5338bc3a20bd93e4a61ff5ff21355cb5a3898de63636bfd1265a531279c23a0c8b4f51794e831f807de35789fded757769161a63fe51c70115ec048bc84c8cc99dee075265b", 0x80}, {&(0x7f00000018c0)="3d70ce98acb785ec423394cd5e61766bbc1775fc69ca22bec70c966aa1859d808eb90135f0f03c3e09cb92bfc52a1c3be3b4c6c22ce1799839bb99887eb4f956772131fe9d47958bc39e54b22a1e8a7c3677922c7093ea810b4a4265f89ddcc7f05c04afa91162ae2a27cd9ab7d0ed7b80eb5321", 0x74}], 0x7, &(0x7f0000008380)=[{0xd0, 0x13b, 0x1ff, "240e761469136e4bb5af70f4f979e9224aa5992f42d83153d54f9ed807a84dfe4242e084fea07998b466f4024887c12c62d5cf8348b80847389da0cafeeb9547e5decfb43e81f7277d2921d1b5aaefa5f6501ca62ef985516a4c5eeb69b445593cc4e61c01ce583fa88ee4838de90df2fb52153a7971828bf5690cd9bc4381d7bffca8bcb9cb507c0aefc52261c38d5b7575c9262880567db610f1611d76c6b38d5c8b00238efc55654581fa7d2a3d84a38bdec05288dd06c68a816dfa66e6b5"}, {0xc0, 0x119, 0x7, "663d1c363296fee46121da2bd23ed65fefd40f7c4be063548d4075431df3f80b2e25fcc9fa91142dbdf9a576718d6c9ea1bac937c2e904ceba99a0db4bfeda7b567db440e2af18001e6576da6812e36b1b07851a0b19ee7b916dae298a70a5c3f64096475503da64c95f95449256a5149194ac3593eddf29afa99623783df6690d3c02596abb7f59a219b783befba4853bd28551253917d5087ef2579110730d338bbbd49d1e8dcfbc7719b671ea10"}, {0x108, 0x0, 0x7, "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"}, {0xe0, 0x10c, 0x3f, "af4076b930099e7631bc4d225f746686c5550662a6adfeb07fa3275186c769099ca8c6ed55ec23b8e73da4d0041a0faad2553ca110dd55a0ee081fd6ce13d62b625e5472ed4a678440c708e3a74ffde7116f66f583c49ab723ff070eab57efaff7d4541143527e93db1037d0433d5f90b54dbd36fe07ebc5337d24c0d198a35fad1cbd65dc3a08d5fa9565526f3e8e5a30f7dc13424262342aee50e87319de1d6dd4f0eb4ffaaf5e6d0faee149dc0ea5c49ee88c67dbe68c33b010e492eff391b0fc1fcc071a347a92b01c3fd70595"}, {0x70, 0x1, 0xd3, "b4aab71728276418bd85d0be10f15f9ceb36e53a2bfef34691ebdcd675cd5b7c4ad71929c3152a1c614b3b2ea9dc034154e967fcff2a2f44850810d51e300bddf1e0103e9d152f5b797f9f9c160bec81fc910c06210c23532c84e8fa715e8b"}, {0x98, 0x11b, 0x200, "ea892ca9dcbdf55be292a37b15c55cfe872188dc654fe65844d0a5ba0dccbb95a373e18af08791d724e237633219b6d119ea810125acea9cf30e9e5dd748215297087b5606de5a3714e5b250b0c825d2974c4ff42fc154043ac247b5f815b9905a877ff518d0172669f6b8b2c6c65ff3119c347ac490cb64c7353a7a4673c11c1d0293"}, {0x98, 0x0, 0x4, "dc056f9793cf62b9e3d62ba557ccad0e99a4396611823b5bec194e1bb4309d98421785c9ee03690e50c96029ddefbbad6f967279351760f42ed6761c9949f0da308374889b5d2e48874451cd868e1c5c74816b54f6b4adf3ab053a7d0914f8692e5d14397efeb541b71ebcec94f2c3a61e1e8e994e688e576cc9128ed95e4fe99035b397459696"}, {0x1010, 0x115, 0xfffffffffffffffe, "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"}, {0x1010, 0x10e, 0x83, "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"}], 0x2538}, 0x3}, {{&(0x7f0000003f00)=@isdn={0x22, 0x77d4, 0x8000, 0xf07}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003f80)="6b1816e6e5e727d4ac7c0f05616fd2210223a9258c3482dc56c97b89bb84c023a48af73d6c896522a67d4d83f97e01e5ee1ce9e5330ed572379e7f6567bf43fb216ba0bbb38a3d9fdced2dcb848e8abc3c6739ef355a059ae9794600e385a9a4877f748e0d4a0682c7342553661ac8555f90ceac02f4577ed7dbfc264ab465444d9372a3d4b0e9070a0177d31062c13dea93dda884ed3ebaf71cf089637e8956b28bc823e7678aa77013", 0xaa}, {&(0x7f0000004040)="dec9188fe3cd3f47251b7c80fe8f52a6710726a0f32127e5c6a70ef79922f56f231ed7ca1c15c2586d84aeab171c20d5eb324feb4196a1978a7244b6049b74684b57baed80cdee65856c377559299173db21b8a0aaaed400920da98a7e292a53e22396b0f355f41669", 0x69}], 0x2, &(0x7f0000004100)=[{0xa8, 0x108, 0x80000001, "2a7fb08edf6fb421a797c504856782dfae28f93b8bfd8a304535f1ee73ff4d2a15c3e5c1a22b297ac0e974c0bd95218c82492d8ef2457527c9f7ca7f1d7cc4986b06cfc248b2d92e2d6ef7d221b2dbd42baaa014eb255cee65bb1de52e3364a835a7ab288cdf22a0de35264da8dad786363e61afb26c288b95de337822376b317ab2873093e9db87a5d17c5862b6e72112e1c2"}, {0xb8, 0x10f, 0x1f, "b9ab3d5470de5e22d11a2f58800f4174de0c3c6955ecee77a47c6affdb7a5692360dafcb876857ab0dfe02dd940a1c484345b79f7df3980fa02bccdb84fb88a202ee0c849cce5f3eaa31d15f8a4d6a1b9c641637ffed41d5e5f01ff3d7ccb5e1d7564233c5d94e510be33891b0e9188ffa7c4816a7140fe96308dea51fedbe5c713a40828bba289777a77d49958291f72a2603662be1f47cf1ea909594dfd8d47c"}], 0x160}, 0x20}, {{&(0x7f0000004280)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x4, 0x4, 0x3, 0x0, {0xa, 0x4e23, 0x4, @mcast2, 0x3}}}, 0x80, &(0x7f0000004340)=[{&(0x7f0000004300)="1f9a70df5c27a08b7f4c70aadae9be0c4f7504d7d645f56c1963", 0x1a}], 0x1, &(0x7f0000004380)=[{0xfffffffffffffdb5, 0xff, 0x3, "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"}, {0x90, 0x117, 0x6, "637dd404a3e0b607db0a3924a00d62a0caa961013adca1c1f6816ba4c42c69a39b0fdd478bea806710ee8d9e1931c2f321376b3cef1a10f5b991ef4df0b05ecb00edee9c5510fbb9e040575bd87f931ec0027afd2ebb9fb6c4fe05bab7c7bc2575e204b38d2d5d0a901d4c79fa83ad9b494087203c9b6387f04cd6"}, {0xe8, 0x11d, 0x4, "1158df2b38c7daff92f2993ed878234a2e0b2b8335de4f7b7d62af8d37597995ce01070ca9bd90b17d271cdd243ce412a1bb4e4a6fd82d67fd6417b9174da78e0278d9c3cf156efda1b5569d7c852f2c448cc39b098cb01c100c0958b5349bc3f0b949b7e82458e4be5c23d41acb305baef7c9901224bc5eaf43d3fa1682ba7856fd66bba7d287666a67f0cc7f711c0d95f960c2771bef580000f7bbbd82ee2cffd6e629f6a38e5d3d156fa3c36e7c127411ea92ac2c21338e9c5083456f3ede64f8c578752dcdc9407d35f3c5077d76cf"}, {0x30, 0x11f, 0x2, "ccfd57cf905c2b7b630349e52e42ea5cda1e6484cb4cc9a698eef7f2c3562667"}, {0x80, 0x3a, 0x4, "0587fc63e1007135afd883b33bf3e4de6af7c3fbf0af17a6fdb4e06d3add6c87658461eb106e985abda0626892854389be0ddfa8e9bab34f04b02dfd2db3b4de9efc788a0bba5298b5af966bd10e4707be65b9fb55d025be0ad4e722d43f5940a5f22a1909d8daf40c5e"}, {0x1010, 0x107, 0x7, "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"}, {0xa0, 0x0, 0x7, "644c7f7a7d937c18b6eb539565b528a0207428b191ea6a8306f09e5753ee21556df59457bc95c14f2d8bd595a264b53a234629ac9d625404f5b71ba4f75cc99d2246e5777dda17e0c7d3030147c9677730b2f83e4c2abee1e2412e5955b60027bc1f22aa7581dcc7c2cc011a0b49bce164279f4584b09c553316faaf8a140ecb9d1d9d75837b66347ed08f2170"}], 0x22e8}, 0x5}, {{&(0x7f0000006680)=@nl=@proc={0x10, 0x0, 0x25dfdbfd, 0x40000}, 0x80, &(0x7f00000067c0)=[{&(0x7f0000006700)="cf2f197783e222c018c243fb72c353cb2959c7bc8a23ae8f2a0f6a49df8e2107c852d840a89df9bc3e05091ef46a3b6435c7c25e4614b87b651ee9467a6f7870ef9b7e86ae84ab0a487f2bb98d6411eed6f3e61bd5185c1572", 0x59}, {&(0x7f0000006780)="0e2d63bdf7b8dfc8afd3785f6fb2a1e8daefeac41a9e9837ae2d6dacf8b96a4a8f2b703e8109ae9f4b8915e12910577a9699a14cde050848df", 0x39}], 0x2, &(0x7f0000006800)=[{0xe8, 0x103, 0xbcd, "b90d34602201d015f861ed117bbcc2725decae97fea658ebe94630d15fdd626c78cbc1bb3fda629a950fe90b61d7b3b432b5a545fb7e32adac5f82469162b4c332babd7bd7f6fa046acab85419b285d72a1bbd868ff86500363421332950fefc262cf04bb6be5fe558081e6d5a0c2fa7cf3aebdb80e6db12e0b21d9ae204db8ea97f5bf6c08b1d5430300a0834f471ffc77293857f8c8bfbf629ce462cd6c5243e0f27de6caaf82c2bd479489f86274c7d427798b51c7438093bce40f777217f8978407064c8b4e1100c87b8a092c6b34bfe7d"}, {0x1010, 0x0, 0x3, "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"}, {0xc0, 0x116, 0x200, "6dd6a41f6ecb6f0325ef219cbef4eaac87b32b2dc244eadf33fb75d1236a4b6b9af6f41a9ebbda2e2ee8fa1b73ea3e06e09f7bd7b377ac4dbd264bcf9f922fd836b60909f8c35beea74ebc4c5e737eb18e2749283f12f9d064e3378fac1c3bf643a48f5d04112dd3020c7816d4d2d75373eb73db6054d2b1b9e1077577a92141c7298e2a2dfc5dcfc935c3d5fd6822743e57cbe3abb3c27aa6e69645e223bb2f172857f95ae5e8c67d16bcdad623a034"}], 0x11b8}, 0x7}, {{&(0x7f00000079c0)=@pptp={0x18, 0x2, {0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, &(0x7f0000007f40)=[{&(0x7f0000007a40)="d40a60b106ffe944143861a069d1e5d303b37f98704c8a98b9f7ad334e8bda32355047f6ff910ee8cf8224f8ccd6428bc0d6fe2aa5fd36dbc67d2bac7c090fb3f6ff3f4b53634acc85604b67b9ed29eccc8978dbfdbda583062905271fade81b5221378a428a38a4fe45527503322e9d091f64d9ce525514665507ec", 0x7c}, {&(0x7f0000007ac0)="d7e86bd9b78a525cacc56b1d182110e5f8ca184efd5079954ac0445d7ec8038be36c6b66a4b7529e0b5365cb5eafaed613df75d9c756aa650b218683f615fa218407c62815e5d6ff0de199ac5ac48e6faa80e71c9ccd675f0b2747cbfa7a8f0f5fe8b529fd4c6ff6ded62288bf664d762c1478dbdde34fecebf5f44dddaee557449ab805cb1d1656", 0x88}, {&(0x7f0000007b80)="6c865a9d22880516ddc3baf793b10e3b447494bbc7a41ede1d45515dcb9739cc9b7f8da2449c4e75f7f59063e778034417b25b523c5f5c0627f37710feba9ce46f63d0a9fc65ad4f486e313423576b222c93b1ce1fb8f10e7e4c34f6a5c2f9b986098e846f0737a02a3d285b726f2bd1c4f0dea8639516798dbb8dff47708034fcee8555a4d12caa759068f82801cc33378c1b46ff0694890c38a9d72cc1778389485dfbfe01b490d5b21051489326f121a68cde96d12f525f17cd3749e1e2d4fe2f43d2216c53a65958ee1b8c0816d95c08486cdc2bf6df5a9a4d5c", 0xdc}, {&(0x7f0000007c80)="6759c5cbdf7347ef94d264f48f14853bdb33b5936859ee43e94bb231573a5fc756481f8e67c75eb91261260ce540e4e08cd9c956", 0x34}, {&(0x7f0000007cc0)="5e037f0037f94f5e94b9ee07ee3ba25de90001d8746885229093b184450ab8017624989729ddea06d64f955dbc0220a8133c4e67c5217f840a1d12c900d225d16f0d014e6d1b783890cdc2966596a2236b71a7ef98be8f5eb9a7edd49469b6a5587f972acf374441f14fca91c62033236c15a332b8c4db0deeabe078f895099bd16cf5c8f4b3c5ad62179bf0794532cc8f0c650af54f5a33eb7daaa9f546165123ec1a183c48f647d8796725d8ba7ca0f0932c2e6a234cb037eac1912ccca909d82d5ee4aa4ac8517434f17e182e64a74444dcab14e3a74eee91e522c857c2e0b256398ab692", 0xe6}, {&(0x7f0000007dc0)="0639e3646a7c39631cb0a25c97625be54a4c5d1ab0ecce25e22846fc0bf2217e8de69e57c5cd52ce7ba04d67970576a560b46997fe9a8b1212fe4e486a465c44185317d1bb37cd7a51027ce615c9e0fb242d44431346bb6018076b7e1bd7de6076a46c66235a2be84dd1bc4500cc8674d54157522c3bc00188b6f84c6455c82a55267a77d905041a4f75278eb7af4786090226e30280902a93091b43b77e77f15d0eb022f4fbb7ea19da27fd180a31d08fab4cbe99fe24da0e5899009b1154ed7186392d644d4ef14e294373aeb821199d6945cd3c5093197d4fba2db293cce533d946e7d19dd6b44dbec6", 0xeb}, {&(0x7f0000007ec0)="9585abc10dc41834f831507d858241a41fd277d9431ec6597770870849dbff25c1590dacc5c2fa3bab8cc3347ed9a6784530e479902f3b1c3f757e3b1662881409fada952f0a33f0c4312916", 0x4c}], 0x7, &(0x7f0000007fc0)=[{0x88, 0x11f, 0x9, "f2dd5cf0813778cee6802baa7ab6c50433d4217491374344bcab0b7200cdc13f1450be00b86a3a3ffa8f3809b92f674e08b6945f614063dc3092f48925c103612b61d286e65bdcd96b8530da7b29b3e69f0578bd86971b66be2804aa93cc78fbce3cc23b899504270f8248c66bc5ec67484275509bfe93"}], 0x88}, 0xe73}, {{0x0, 0x0, &(0x7f0000008080), 0x0, &(0x7f00000080c0)=[{0xb8, 0x10a, 0x0, "cd8979f87bb8f0a971e42f30660160bca8bcb0087e08bf8277c5acd1dcf16c6e43a916b279a180aeac209c3b53f7e4c405965b72d4dd74909c7c20ce8934177c638ba04592d247fe3bc03285803e9a2b3fb8f19fa12556af30f176a65cd945f46cd462e6612bda883dec58ae5d6fdb35090dd42ad150452fcbc322eed70bebf8e1586f2e8578c3dc88715b3350fc650e97666761ca367d5adb83a15e6c98da97e3f5083b1f"}, {0x70, 0x111, 0x4, "8bd735cfb4b5a0bb0b04c1f4cd742e2d809c38bf51a996a72ecbffaff3ab27bdfd54cd2b30cdb4cf59b9abc45faad26fc00bacd4e47aea13a19c003a708d32dd73aeb996a9ad490ffcc57040ea773d1e21bef24c7a4a55ad5824202255"}], 0x128}, 0x7fff}], 0x6, 0x0) [ 2395.618626] audit: type=1400 audit(1549744601.480:11215): avc: denied { map } for pid=13674 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2395.691459] audit: type=1400 audit(1549744601.480:11216): avc: denied { map } for pid=13674 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2395.757274] audit: type=1400 audit(1549744601.480:11217): avc: denied { map } for pid=13674 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:36:41 executing program 2: io_setup(0x1, &(0x7f0000000080)=0x0) r1 = socket(0x2, 0x803, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x412400, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x10000}]) [ 2395.825300] audit: type=1400 audit(1549744601.500:11218): avc: denied { create } for pid=13666 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:36:41 executing program 5: r0 = socket$packet(0x11, 0x400000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x3e}, 0x1c) [ 2395.898512] audit: type=1400 audit(1549744601.500:11219): avc: denied { getopt } for pid=13666 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2395.926113] audit: type=1400 audit(1549744601.510:11220): avc: denied { map } for pid=13680 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2395.957323] audit: type=1400 audit(1549744601.560:11221): avc: denied { create } for pid=13666 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:36:41 executing program 3: write$smack_current(0xffffffffffffffff, 0x0, 0x0) r0 = creat(0x0, 0x81) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000000c0)=0x1) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x5e, 0x0) preadv(r1, &(0x7f0000000480), 0x1000000000000156, 0x0) [ 2395.984956] audit: type=1400 audit(1549744601.560:11222): avc: denied { getopt } for pid=13666 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2396.028572] audit: type=1400 audit(1549744601.590:11223): avc: denied { map } for pid=13683 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2396.095595] [ 2396.097273] ====================================================== [ 2396.103596] WARNING: possible circular locking dependency detected [ 2396.109925] 4.14.98+ #7 Not tainted [ 2396.113556] ------------------------------------------------------ [ 2396.119882] syz-executor.3/13699 is trying to acquire lock: [ 2396.125592] (&sig->cred_guard_mutex){+.+.}, at: [] lock_trace+0x3f/0xc0 [ 2396.134031] [ 2396.134031] but task is already holding lock: [ 2396.140012] (&p->lock){+.+.}, at: [] seq_read+0xcd/0x1180 [ 2396.147222] [ 2396.147222] which lock already depends on the new lock. [ 2396.147222] [ 2396.155546] [ 2396.155546] the existing dependency chain (in reverse order) is: [ 2396.163194] [ 2396.163194] -> #2 (&p->lock){+.+.}: [ 2396.168317] [ 2396.168317] -> #1 (&pipe->mutex/1){+.+.}: [ 2396.173954] [ 2396.173954] -> #0 (&sig->cred_guard_mutex){+.+.}: [ 2396.180294] [ 2396.180294] other info that might help us debug this: [ 2396.180294] [ 2396.188441] Chain exists of: [ 2396.188441] &sig->cred_guard_mutex --> &pipe->mutex/1 --> &p->lock [ 2396.188441] [ 2396.199326] Possible unsafe locking scenario: [ 2396.199326] [ 2396.205406] CPU0 CPU1 [ 2396.210072] ---- ---- [ 2396.214733] lock(&p->lock); [ 2396.217838] lock(&pipe->mutex/1); [ 2396.223982] lock(&p->lock); [ 2396.229615] lock(&sig->cred_guard_mutex); [ 2396.233943] [ 2396.233943] *** DEADLOCK *** [ 2396.233943] [ 2396.240014] 1 lock held by syz-executor.3/13699: [ 2396.244768] #0: (&p->lock){+.+.}, at: [] seq_read+0xcd/0x1180 [ 2396.252414] [ 2396.252414] stack backtrace: [ 2396.256926] CPU: 1 PID: 13699 Comm: syz-executor.3 Not tainted 4.14.98+ #7 [ 2396.263942] Call Trace: [ 2396.266545] dump_stack+0xb9/0x10e [ 2396.270133] print_circular_bug.isra.0.cold+0x2dc/0x425 [ 2396.275527] ? __lock_acquire+0x2d83/0x3fa0 [ 2396.279901] ? __lock_acquire+0x56a/0x3fa0 [ 2396.284198] ? trace_hardirqs_on+0x10/0x10 [ 2396.288447] ? check_preemption_disabled+0x35/0x1f0 [ 2396.293506] ? deref_stack_reg+0xaa/0xe0 [ 2396.297587] ? unwind_next_frame+0x628/0x1800 [ 2396.302148] ? lock_acquire+0x10f/0x380 [ 2396.306143] ? lock_trace+0x3f/0xc0 [ 2396.309786] ? lock_trace+0x3f/0xc0 [ 2396.313529] ? __mutex_lock+0xf7/0x1430 [ 2396.317525] ? lock_trace+0x3f/0xc0 [ 2396.321162] ? __save_stack_trace+0x7a/0xf0 [ 2396.325514] ? lock_trace+0x3f/0xc0 [ 2396.329158] ? depot_save_stack+0x11d/0x418 [ 2396.333518] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 2396.339040] ? __lock_acquire+0x56a/0x3fa0 [ 2396.343349] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 2396.347861] ? __kmalloc+0x143/0x340 [ 2396.351591] ? kvmalloc_node+0x43/0xd0 [ 2396.355553] ? seq_read+0x8cd/0x1180 [ 2396.359282] ? do_iter_read+0x3e8/0x5b0 [ 2396.363397] ? vfs_readv+0xe6/0x150 [ 2396.367091] ? do_preadv+0x189/0x230 [ 2396.370973] ? do_syscall_64+0x19b/0x4b0 [ 2396.375057] ? check_preemption_disabled+0x35/0x1f0 [ 2396.380091] ? lock_trace+0x3f/0xc0 [ 2396.383788] ? perf_trace_lock_acquire+0x4e0/0x4e0 [ 2396.388792] ? lock_trace+0x3f/0xc0 [ 2396.392436] ? proc_pid_syscall+0x94/0x220 [ 2396.396743] ? mem_read+0x60/0x60 [ 2396.400267] ? get_pid_task+0x91/0x130 [ 2396.404171] ? lock_downgrade+0x5d0/0x5d0 [ 2396.408336] ? check_preemption_disabled+0x35/0x1f0 [ 2396.413426] ? proc_single_show+0xf1/0x160 [ 2396.417679] ? seq_read+0x4f7/0x1180 [ 2396.421416] ? seq_lseek+0x3d0/0x3d0 [ 2396.425208] ? security_file_permission+0x88/0x1e0 [ 2396.430158] ? do_iter_read+0x3e8/0x5b0 [ 2396.434213] ? vfs_readv+0xe6/0x150 [ 2396.437915] ? compat_rw_copy_check_uvector+0x300/0x300 [ 2396.443300] ? __fget+0x1ff/0x360 [ 2396.446766] ? lock_downgrade+0x5d0/0x5d0 [ 2396.450996] ? lock_acquire+0x10f/0x380 [ 2396.454988] ? __fget+0x44/0x360 [ 2396.458375] ? check_preemption_disabled+0x35/0x1f0 [ 2396.463467] ? check_preemption_disabled+0x35/0x1f0 [ 2396.468534] ? __fget+0x226/0x360 [ 2396.472017] ? do_preadv+0x189/0x230 [ 2396.475747] ? do_readv+0x240/0x240 [ 2396.479387] ? do_clock_gettime+0xd0/0xd0 [ 2396.483555] ? __fget_light+0x16a/0x1f0 [ 2396.487548] ? do_syscall_64+0x43/0x4b0 [ 2396.491547] ? SyS_writev+0x30/0x30 20:36:42 executing program 2: futex(&(0x7f000000cffc)=0x2000000000000004, 0x109, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000100)=""/180) r1 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) chown(&(0x7f0000000000)='./file0\x00', r1, r2) [ 2396.495191] ? do_syscall_64+0x19b/0x4b0 [ 2396.499278] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 20:36:42 executing program 3: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="0400001db7fd05080000000000002937869986de2619d9660042a6112d007a4d0000e7b50795f9178d426d492ed2bd4de5bd438af1423b4287"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000840)=0x1, 0x3a0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) preadv(r1, &(0x7f0000000540)=[{0x0}, {&(0x7f00000003c0)=""/243, 0xf3}, {&(0x7f0000000200)=""/59, 0x3b}, {&(0x7f00000004c0)=""/42, 0x2a}, {&(0x7f0000000500)=""/52, 0x34}], 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000240)=0x3, 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000700)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000680)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000006c0)) r3 = gettid() ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000740)) getpid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000007c0)) r4 = syz_open_procfs(r3, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x30, &(0x7f0000000900)=0x8, 0xfffffe61) setsockopt$packet_int(r4, 0x107, 0x12, &(0x7f00000005c0)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 20:36:42 executing program 2: futex(&(0x7f000000cffc)=0x2000000000000004, 0x109, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000100)=""/180) r1 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) chown(&(0x7f0000000000)='./file0\x00', r1, r2) 20:36:43 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000940)={&(0x7f00000009c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="03002dbd7000fddbdf25080000000800060004000000f44fde22c221a74f8e01176ff14f1687f8ec43a10677a414546e2d129d7e37556bb0d78daf749ff750fc074a02efa17ab4956c2385b95320ee6cd759fcf093dcdbca980e49ac0506034a0f1bb6cc2d44430859d9d52520cf7bd2136de6db8f0348cfbb3dce180dc1afee4bb1a071ef69ed93a17c6b57071e5c7f"], 0x1c}, 0x1, 0x0, 0x0, 0x200400c0}, 0x840) preadv(r1, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f0000000040)=""/229, 0xe5}, {&(0x7f00000001c0)=""/206, 0xce}, {&(0x7f00000002c0)=""/191, 0xbf}, {&(0x7f00000003c0)=""/245, 0xf5}, {&(0x7f00000004c0)=""/131, 0x83}, {&(0x7f0000000580)=""/77, 0x4d}, {&(0x7f0000000600)=""/71, 0x47}, {&(0x7f0000000680)=""/13, 0xd}, {&(0x7f00000006c0)=""/194, 0xc2}], 0xa, 0x0) connect$inet6(r1, 0x0, 0x0) 20:36:43 executing program 5: r0 = socket$packet(0x11, 0x400000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x3e}, 0x1c) 20:36:43 executing program 3: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="0400001db7fd05080000000000002937869986de2619d9660042a6112d007a4d0000e7b50795f9178d426d492ed2bd4de5bd438af1423b4287"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000840)=0x1, 0x3a0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) preadv(r1, &(0x7f0000000540)=[{0x0}, {&(0x7f00000003c0)=""/243, 0xf3}, {&(0x7f0000000200)=""/59, 0x3b}, {&(0x7f00000004c0)=""/42, 0x2a}, {&(0x7f0000000500)=""/52, 0x34}], 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000240)=0x3, 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000700)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000680)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000006c0)) r3 = gettid() ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000740)) getpid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000007c0)) r4 = syz_open_procfs(r3, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x30, &(0x7f0000000900)=0x8, 0xfffffe61) setsockopt$packet_int(r4, 0x107, 0x12, &(0x7f00000005c0)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 20:36:43 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r3 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r3, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r4}) getpeername(0xffffffffffffffff, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:43 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) open$dir(0x0, 0x2840, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000040)=""/113) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000740)={0x7, 0x101, 0x9, 0x9, 0x8}) preadv(r2, &(0x7f0000000480), 0x2000000000000113, 0x0) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f0000000640)=[{&(0x7f0000000300)="4faf9f528908cc0e6a8aaa9de91cf5671c5dfe30f07342a676a8df4637d66e6614441edb59538b3f5455379bacc406444c1676db8a74b9f0f246e96a490c068ee5b9aa351ec6e548234991bef13cf4996722d141384c398c796f29395a1c36ad301f007125b5cb0f2d585dbd0edef85b592960ef3271c3e04c9a45cb5b7266cfdecfbeb35aa03e9468133a5471b3d46c18235fa5f84375a91755a33bb95bf09870691b2a0e2a87285fa490c3659e5a8b7b14fc11dd3e799e2679ede87399fee458ff1ce2579824ce59a8af9e875763dec72790f5a1050a29e2784d4745e2ad9c43bf09e99008b1ddd2a3037677cae380", 0xf0, 0x8}], 0x1000, &(0x7f0000000680)={[{@dots='dots'}, {@fat=@showexec='showexec'}, {@nodots='nodots'}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}, {@dots='dots'}], [{@seclabel='seclabel'}, {@dont_measure='dont_measure'}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'system_u'}}, {@appraise='appraise'}, {@hash='hash'}, {@dont_measure='dont_measure'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@subj_user={'subj_user', 0x3d, 'net/snmp\x00'}}]}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000004e22000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="636f76746567a7283df366ad9b752c636f6e746578743d73797374656d5f752c00000000fbd7f395ab7b55bf5091542bea0630ba1915257fc9518c5ec1eb19a6c36cba1068be07efb7b4ca1a969330080e265748bf5b1169103d9f144b4435e8beebf40c0bb07aba579a095c83aa3c0f172395ab92a15a0dce1b42e9b6fe771e700e7252c7122564f90bd34450e4bc23f19c149bfb54475bda34a16f354b29393b78666d70371ee9b61f71f243466af3db45364d0703c6f0479e59fadcd7295d45ba0f09045bc71f8e1dc8a789330f30393edd06cc19626ee2daab954172c154b8d0318803e3fc545291dd208716f25b3a0606f6b5a106ea362073aa554cebcaae9ed8a038a78933a887b17875ef4dc54a1393010c81f6c33bf67600000000000000000000999f6321d57c88a70ebb279f6e56e91d5a3302662f6f7d7e8ca194803b66ea3a55198035c72e835b02228b918eaf4c4a3c09347c1af42eec047e1bfea4132bd9e5166a23f0438091dd23c8174b4694092e8e6bc9965cc9b2d49e06a8ec94a5e67505d9b84600081ac9be844ed682ea557eb56678512f97e9b0199e6bb55ae1ccbed0eda56ebcc4ae8d2ff4d6b00af345da1788c0582956494d39a401bce541e0c5e5e5510eb9bc12652330b199d8a450e00ff6b95b2f018a56f4108b6c397cfd107c966c2c625fdd97e41933b1a67f95aefd3ecf329c6f177d1971e8711bfe8fa2414222f45c850f3ee8e8bdbc812d60c16a2ba5bd118b37ba5996935867ebe15c1546fec79311fe5a97c32006084070946a49a193f3"]) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000140)={0x3, 0x3f}) 20:36:43 executing program 2: futex(&(0x7f000000cffc)=0x2000000000000004, 0x109, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000100)=""/180) r1 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) chown(&(0x7f0000000000)='./file0\x00', r1, r2) 20:36:43 executing program 2: futex(&(0x7f000000cffc)=0x2000000000000004, 0x109, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000100)=""/180) r1 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) chown(&(0x7f0000000000)='./file0\x00', r1, r2) 20:36:43 executing program 3: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="0400001db7fd05080000000000002937869986de2619d9660042a6112d007a4d0000e7b50795f9178d426d492ed2bd4de5bd438af1423b4287"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000840)=0x1, 0x3a0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) preadv(r1, &(0x7f0000000540)=[{0x0}, {&(0x7f00000003c0)=""/243, 0xf3}, {&(0x7f0000000200)=""/59, 0x3b}, {&(0x7f00000004c0)=""/42, 0x2a}, {&(0x7f0000000500)=""/52, 0x34}], 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000240)=0x3, 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000700)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000680)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000006c0)) r3 = gettid() ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000740)) getpid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000007c0)) r4 = syz_open_procfs(r3, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x30, &(0x7f0000000900)=0x8, 0xfffffe61) setsockopt$packet_int(r4, 0x107, 0x12, &(0x7f00000005c0)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 20:36:44 executing program 5: r0 = socket$packet(0x11, 0x400000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x3e}, 0x1c) 20:36:44 executing program 2: futex(&(0x7f000000cffc)=0x2000000000000004, 0x109, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000100)=""/180) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 20:36:44 executing program 2: futex(&(0x7f000000cffc)=0x2000000000000004, 0x109, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000100)=""/180) geteuid() 20:36:44 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000ffd000/0x1000)=nil) fcntl$setstatus(r0, 0x4, 0x4c00) 20:36:44 executing program 5: r0 = socket$packet(0x11, 0x400000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x3e}, 0x1c) 20:36:44 executing program 2: futex(&(0x7f000000cffc)=0x2000000000000004, 0x109, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000100)=""/180) 20:36:44 executing program 2: futex(&(0x7f000000cffc)=0x2000000000000004, 0x109, 0x4, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0xffffffffffffffff) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x2000, 0x0) 20:36:44 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r3 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r3, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r4}) getpeername(0xffffffffffffffff, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:44 executing program 5: r0 = socket$packet(0x11, 0x400000000003, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x3e}, 0x1c) 20:36:44 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x6575) fcntl$setlease(r0, 0x400, 0x3) connect$inet6(r1, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000002c0)={'bond_slave_1\x00', {0x2, 0x4e22, @loopback}}) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000000)="53062f5ceb4ca480f17584bbeb894801727463b3e8b93ebaffe17d8b91c7378414d42c00bb350b18422018a5abfdf5c4908ebafff4e8b0bb1a4c64815b2091206b4e38c0d8f74f5922f1f16ddb18640023bc2543af251cb55f29c9f4dca9f4d9014652ff4b576500e4901f11298e8662b214668ad69b0766633fb537204cc5d078a35a0821cbd88c155636bc7cbfdbaaf2980d726b30b2af037a9b8df4c132f71c4a38e2133461fb2ca71a3cf4109a060b85419b05eee32511d99e602fc98b661dd56e39bf10eb0688e0b2975374fbd29d07213e079cedf7ac4223f6e947d2b85377a67ef34c55b73b60c11acecb468a6d6b44f34c1912e4ab79e8b08d321c7a") fstat(r1, &(0x7f0000000240)) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000100)=0x54) 20:36:44 executing program 2: futex(&(0x7f000000cffc)=0x2000000000000004, 0x109, 0x4, 0x0, 0x0, 0x2) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x2000, 0x0) 20:36:47 executing program 3: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="0400001db7fd05080000000000002937869986de2619d9660042a6112d007a4d0000e7b50795f9178d426d492ed2bd4de5bd438af1423b4287"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000840)=0x1, 0x3a0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) preadv(r1, &(0x7f0000000540)=[{0x0}, {&(0x7f00000003c0)=""/243, 0xf3}, {&(0x7f0000000200)=""/59, 0x3b}, {&(0x7f00000004c0)=""/42, 0x2a}, {&(0x7f0000000500)=""/52, 0x34}], 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000240)=0x3, 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000700)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000680)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000006c0)) r3 = gettid() ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000740)) getpid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000007c0)) r4 = syz_open_procfs(r3, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x30, &(0x7f0000000900)=0x8, 0xfffffe61) setsockopt$packet_int(r4, 0x107, 0x12, &(0x7f00000005c0)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 20:36:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) 20:36:47 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) open$dir(0x0, 0x2840, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000040)=""/113) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000740)={0x7, 0x101, 0x9, 0x9, 0x8}) preadv(r2, &(0x7f0000000480), 0x2000000000000113, 0x0) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f0000000640)=[{&(0x7f0000000300)="4faf9f528908cc0e6a8aaa9de91cf5671c5dfe30f07342a676a8df4637d66e6614441edb59538b3f5455379bacc406444c1676db8a74b9f0f246e96a490c068ee5b9aa351ec6e548234991bef13cf4996722d141384c398c796f29395a1c36ad301f007125b5cb0f2d585dbd0edef85b592960ef3271c3e04c9a45cb5b7266cfdecfbeb35aa03e9468133a5471b3d46c18235fa5f84375a91755a33bb95bf09870691b2a0e2a87285fa490c3659e5a8b7b14fc11dd3e799e2679ede87399fee458ff1ce2579824ce59a8af9e875763dec72790f5a1050a29e2784d4745e2ad9c43bf09e99008b1ddd2a3037677cae380", 0xf0, 0x8}], 0x1000, &(0x7f0000000680)={[{@dots='dots'}, {@fat=@showexec='showexec'}, {@nodots='nodots'}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}, {@dots='dots'}], [{@seclabel='seclabel'}, {@dont_measure='dont_measure'}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'system_u'}}, {@appraise='appraise'}, {@hash='hash'}, {@dont_measure='dont_measure'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@subj_user={'subj_user', 0x3d, 'net/snmp\x00'}}]}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000004e22000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000140)={0x3, 0x3f}) 20:36:47 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x3e}, 0x1c) 20:36:47 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x2000, 0x0) 20:36:47 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="02042dbd7000fc000c000200080002004e200015080004004d00000014000100080005000000000008000900770000003000030414000600005a45efe7060000000000000000ffffffffffff08000500ac1414bb0801080600000000080007004e2100005d000407fd844378fd536307379e023b0057cc8d237c282918bf40128fdd6d3b9ac482627a4173f3d26080b3c8b5214ac76597d9a4d5c5f058fbaf5db704622f62cc1af932e0528eb34a90a84ac1c603a85d273d347ff41a975e64c21ed24b7c3f1596b3a3b5cf68f308b7a38dd4b1daf82a3b87278b21c0492bed58e01e7d4783050000004ca3b4c5fae4639ab635054f469722e95dada1f361a949d0ee460e313674d470024bb54db260eda4974fb622698c2fc2596bdaa96040ca178df4d5757fb1257c3001000000000000002ca33d107e770f50c11f8938e560522aa795b7c84cf2de19d16e42046de61e3775326e9ab668ac894a6598cd1b85c9e18cef07fd016f12c89e37719a5b39777f18a1634fa8772cee025e11d36fda12a3359a014e784ef0a0ca7c41feb23ac0926b953c9a4f9a7f77e64e49b083559a2e4f7014d036968a351fb5f8c3abb2c2db422c041c5533518615a07413afe59cdf2d55da68"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r3 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r3, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r4}) getpeername(0xffffffffffffffff, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:47 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2000, 0x0) 20:36:47 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x3e}, 0x1c) [ 2401.137553] kauditd_printk_skb: 62 callbacks suppressed [ 2401.137560] audit: type=1400 audit(1549744607.040:11286): avc: denied { map } for pid=13812 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2401.192612] audit: type=1400 audit(1549744607.080:11287): avc: denied { map } for pid=13812 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:36:47 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x3e}, 0x1c) 20:36:47 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2000, 0x0) [ 2401.265616] audit: type=1400 audit(1549744607.080:11288): avc: denied { map } for pid=13812 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2401.319611] audit: type=1400 audit(1549744607.080:11289): avc: denied { map } for pid=13812 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 20:36:47 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x3e}, 0x1c) 20:36:47 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2000, 0x0) [ 2401.362696] audit: type=1400 audit(1549744607.080:11290): avc: denied { map } for pid=13812 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2401.401740] audit: type=1400 audit(1549744607.080:11291): avc: denied { map } for pid=13812 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2401.448983] audit: type=1400 audit(1549744607.100:11292): avc: denied { map } for pid=13816 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2401.473425] audit: type=1400 audit(1549744607.170:11293): avc: denied { map } for pid=13826 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2401.504819] audit: type=1400 audit(1549744607.170:11294): avc: denied { map } for pid=13826 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2401.542675] audit: type=1400 audit(1549744607.190:11295): avc: denied { create } for pid=13815 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:36:50 executing program 3: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="0400001db7fd05080000000000002937869986de2619d9660042a6112d007a4d0000e7b50795f9178d426d492ed2bd4de5bd438af1423b4287"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000840)=0x1, 0x3a0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) preadv(r1, &(0x7f0000000540)=[{0x0}, {&(0x7f00000003c0)=""/243, 0xf3}, {&(0x7f0000000200)=""/59, 0x3b}, {&(0x7f00000004c0)=""/42, 0x2a}, {&(0x7f0000000500)=""/52, 0x34}], 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000240)=0x3, 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000700)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000680)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000006c0)) r3 = gettid() ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000740)) getpid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000007c0)) r4 = syz_open_procfs(r3, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x30, &(0x7f0000000900)=0x8, 0xfffffe61) setsockopt$packet_int(r4, 0x107, 0x12, &(0x7f00000005c0)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) 20:36:50 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x3e}, 0x1c) 20:36:50 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) 20:36:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='auxv\xbc\x14\xf8\x80\x8cU!\f9\x87I\x90\xea\x9c\xb6\xed\xf3,\x00\xd9\xe9\x96\x9d\x9a{(\xd7\x03\x93Z\xbf\xfe\xc1>\x82\xd5\xd4s\xc0r\xb1\x00c\x12c\xc0\xa0\xcf\xa9\xe6T\x81H\x8cZ\x9edAf\xc4e\xde\xe6\xfcW\x9b\xaf\x87\xfb\xa6\xf2\xe8\n\xccHd\x82\xa1\x9f\x03V\x9f\x1fAy\xbc\xf93\xc47;\xd4\x94\x85A&\xa6\x8d\xa0mE\x1b:\x921\xd8/\xce\xc2\xa1\xd8~\xafb\b\xa2\t\xf7\x9f\x8d\x94\xe6\xc9\xa5\xb1\xa3\xad\x12\x1b\xbavg\xe5\xe0\xfd)\xb68_\x93\xfb\x9a\x8aG\x1a\xc6\r\xee\xcb\x8a\xba,\xd6d\xd8h\xd5\xa1\x18r}\xcb\xcc\t\xe6\x82\x19\x1d\xf5\xd3\xb3\x90\xfe\xad\t\xd8\x925\x1e\au\x8f\x06\xb0\xc1\xdb\xaa4\xfa>\xcd\xf1v\xd0\xaf\x81\xb5\x1f\xf1\xd7p~g\x88\xccC\xca\xa8x\x97\xf6j\x11e\xb0') write$selinux_context(r0, &(0x7f0000000380)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) 20:36:50 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) open$dir(0x0, 0x2840, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000040)=""/113) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000740)={0x7, 0x101, 0x9, 0x9, 0x8}) preadv(r2, &(0x7f0000000480), 0x2000000000000113, 0x0) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f0000000640)=[{&(0x7f0000000300)="4faf9f528908cc0e6a8aaa9de91cf5671c5dfe30f07342a676a8df4637d66e6614441edb59538b3f5455379bacc406444c1676db8a74b9f0f246e96a490c068ee5b9aa351ec6e548234991bef13cf4996722d141384c398c796f29395a1c36ad301f007125b5cb0f2d585dbd0edef85b592960ef3271c3e04c9a45cb5b7266cfdecfbeb35aa03e9468133a5471b3d46c18235fa5f84375a91755a33bb95bf09870691b2a0e2a87285fa490c3659e5a8b7b14fc11dd3e799e2679ede87399fee458ff1ce2579824ce59a8af9e875763dec72790f5a1050a29e2784d4745e2ad9c43bf09e99008b1ddd2a3037677cae380", 0xf0, 0x8}], 0x1000, &(0x7f0000000680)={[{@dots='dots'}, {@fat=@showexec='showexec'}, {@nodots='nodots'}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}, {@dots='dots'}], [{@seclabel='seclabel'}, {@dont_measure='dont_measure'}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'system_u'}}, {@appraise='appraise'}, {@hash='hash'}, {@dont_measure='dont_measure'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@subj_user={'subj_user', 0x3d, 'net/snmp\x00'}}]}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000004e22000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000140)={0x3, 0x3f}) 20:36:50 executing program 4: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f0000000240)=""/98, 0x62}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x6, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/221, 0xdd}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {0x0}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005100)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r5, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r3, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(r3, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:50 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) 20:36:50 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x3e}, 0x1c) 20:36:50 executing program 2: time(&(0x7f00000002c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000005580)=0x68) mlockall(0x6) clone(0x20000000, 0x0, 0xfffffffffffffffe, &(0x7f0000005680), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='blacklist\x00', &(0x7f0000004dc0)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(0x0, 0x0, 0x40) exit(0x7fffffffbffffffd) syz_genetlink_get_family_id$ipvs(&(0x7f0000005180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000005280)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000005240)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x4000000000001) r3 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) fchmod(r3, 0x180) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000055c0), &(0x7f0000005300)=0x2b) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005380)='team\x00') getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000005400)={@multicast2, @rand_addr, 0x0}, &(0x7f0000005480)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'veth0\x00', r4}) getpeername(0xffffffffffffffff, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, &(0x7f0000005640)={@ipv4={[], [], @multicast2}}, &(0x7f0000005840)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0xfffffffffffffeb7) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005d00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 20:36:50 executing program 5: socket$packet(0x11, 0x400000000003, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x3e}, 0x1c) 20:36:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000080), 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'nr0\x00', 0x0}) setsockopt$inet_mreqn(r1, 0x0, 0x827, &(0x7f00000000c0)={@multicast2, @empty, r2}, 0xc) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x13) connect$inet6(r3, 0x0, 0x0) 20:36:50 executing program 5: socket$packet(0x11, 0x400000000003, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x3e}, 0x1c)